On the Usability of Secure Association of Wireless Devices Based on Distance Bounding View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2009

AUTHORS

Mario Cagalj , Nitesh Saxena , Ersin Uzun

ABSTRACT

When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and confidential, in order to mitigate any malicious control of or eavesdropping over the communication. When there is no prior security context, such as, shared secrets, common key servers or public key certificates, device association necessitates some level of user involvement into the process. A wide variety of user-aided security association techniques have been proposed in the past. A promising set of techniques require out-of-band communication between the devices (e.g., auditory, visual, or tactile). The usability evaluation of such techniques has been an active area of research.In this paper, our focus is on the usability of an alternative method of secure association – Integrity regions (I-regions) [40] – based on distance bounding. I-regions achieves secure association by verification of entity proximity through time-to-travel measurements over ultrasonic or radio channels. Security of I-regions crucially relies on the assumption that human users can correctly gauge the distance between two communicating devices. We demonstrate, via a thorough usability study of the I-regions technique and related statistical analysis, that such an assumption does not hold in practice. Our results indicate that I-regions can yield high error rates, undermining its security and usability under common communication scenarios. More... »

PAGES

443-462

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-10433-6_30

DOI

http://dx.doi.org/10.1007/978-3-642-10433-6_30

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1033096396


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "FESB, University of Split, Croatia", 
          "id": "http://www.grid.ac/institutes/grid.38603.3e", 
          "name": [
            "FESB, University of Split, Croatia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Cagalj", 
        "givenName": "Mario", 
        "id": "sg:person.016301435711.11", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016301435711.11"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Computer Science and Engineering, Polytechnic Institute of New York University", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Computer Science and Engineering, Polytechnic Institute of New York University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Saxena", 
        "givenName": "Nitesh", 
        "id": "sg:person.014472007601.70", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014472007601.70"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Information and Computer Sciences, University of California, Irvine", 
          "id": "http://www.grid.ac/institutes/grid.266093.8", 
          "name": [
            "Information and Computer Sciences, University of California, Irvine"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Uzun", 
        "givenName": "Ersin", 
        "id": "sg:person.016065225667.49", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016065225667.49"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2009", 
    "datePublishedReg": "2009-01-01", 
    "description": "When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and confidential, in order to mitigate any malicious control of or eavesdropping over the communication. When there is no prior security context, such as, shared secrets, common key servers or public key certificates, device association necessitates some level of user involvement into the process. A wide variety of user-aided security association techniques have been proposed in the past. A promising set of techniques require out-of-band communication between the devices (e.g., auditory, visual, or tactile). The usability evaluation of such techniques has been an active area of research.In this paper, our focus is on the usability of an alternative method of secure association \u2013 Integrity regions (I-regions) [40] \u2013 based on distance bounding. I-regions achieves secure association by verification of entity proximity through time-to-travel measurements over ultrasonic or radio channels. Security of I-regions crucially relies on the assumption that human users can correctly gauge the distance between two communicating devices. We demonstrate, via a thorough usability study of the I-regions technique and related statistical analysis, that such an assumption does not hold in practice. Our results indicate that I-regions can yield high error rates, undermining its security and usability under common communication scenarios.", 
    "editor": [
      {
        "familyName": "Garay", 
        "givenName": "Juan A.", 
        "type": "Person"
      }, 
      {
        "familyName": "Miyaji", 
        "givenName": "Atsuko", 
        "type": "Person"
      }, 
      {
        "familyName": "Otsuka", 
        "givenName": "Akira", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-10433-6_30", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-10432-9", 
        "978-3-642-10433-6"
      ], 
      "name": "Cryptology and Network Security", 
      "type": "Book"
    }, 
    "keywords": [
      "secure association", 
      "prior security context", 
      "public key certificates", 
      "common communication scenarios", 
      "key server", 
      "malicious control", 
      "device association", 
      "human users", 
      "distance bounding", 
      "entity proximity", 
      "usability evaluation", 
      "usability study", 
      "security context", 
      "wireless devices", 
      "association technique", 
      "communication scenarios", 
      "high error rates", 
      "wireless communication", 
      "user involvement", 
      "usability", 
      "radio channel", 
      "error rate", 
      "such techniques", 
      "users", 
      "security", 
      "promising set", 
      "communication", 
      "band communication", 
      "region technique", 
      "server", 
      "eavesdropping", 
      "devices", 
      "technique", 
      "verification", 
      "active area", 
      "wide variety", 
      "secrets", 
      "scenarios", 
      "bounding", 
      "channels", 
      "set", 
      "certificates", 
      "travel measurement", 
      "distance", 
      "context", 
      "assumption", 
      "order", 
      "method", 
      "alternative method", 
      "research", 
      "evaluation", 
      "process", 
      "variety", 
      "time", 
      "focus", 
      "results", 
      "control", 
      "past", 
      "area", 
      "statistical analysis", 
      "proximity", 
      "practice", 
      "analysis", 
      "region", 
      "rate", 
      "levels", 
      "measurements", 
      "study", 
      "association", 
      "involvement", 
      "paper", 
      "common key servers", 
      "key certificates", 
      "user-aided security association techniques", 
      "security association techniques", 
      "secure association \u2013 Integrity", 
      "association \u2013 Integrity", 
      "thorough usability study"
    ], 
    "name": "On the Usability of Secure Association of Wireless Devices Based on Distance Bounding", 
    "pagination": "443-462", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1033096396"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-10433-6_30"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-10433-6_30", 
      "https://app.dimensions.ai/details/publication/pub.1033096396"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2021-12-01T20:04", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20211201/entities/gbq_results/chapter/chapter_315.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-10433-6_30"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-10433-6_30'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-10433-6_30'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-10433-6_30'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-10433-6_30'


 

This table displays all metadata directly associated to this object as RDF triples.

180 TRIPLES      23 PREDICATES      107 URIs      97 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-10433-6_30 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 anzsrc-for:0806
4 anzsrc-for:10
5 anzsrc-for:1005
6 schema:author Ne143b9d81fb6499d877e3cd3fbb7edd5
7 schema:datePublished 2009
8 schema:datePublishedReg 2009-01-01
9 schema:description When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and confidential, in order to mitigate any malicious control of or eavesdropping over the communication. When there is no prior security context, such as, shared secrets, common key servers or public key certificates, device association necessitates some level of user involvement into the process. A wide variety of user-aided security association techniques have been proposed in the past. A promising set of techniques require out-of-band communication between the devices (e.g., auditory, visual, or tactile). The usability evaluation of such techniques has been an active area of research.In this paper, our focus is on the usability of an alternative method of secure association – Integrity regions (I-regions) [40] – based on distance bounding. I-regions achieves secure association by verification of entity proximity through time-to-travel measurements over ultrasonic or radio channels. Security of I-regions crucially relies on the assumption that human users can correctly gauge the distance between two communicating devices. We demonstrate, via a thorough usability study of the I-regions technique and related statistical analysis, that such an assumption does not hold in practice. Our results indicate that I-regions can yield high error rates, undermining its security and usability under common communication scenarios.
10 schema:editor N532c2c93678646c38b3752025539d9b7
11 schema:genre chapter
12 schema:inLanguage en
13 schema:isAccessibleForFree false
14 schema:isPartOf Nd854334c644f498ca2cc8a58d8e8fc11
15 schema:keywords active area
16 alternative method
17 analysis
18 area
19 association
20 association technique
21 association – Integrity
22 assumption
23 band communication
24 bounding
25 certificates
26 channels
27 common communication scenarios
28 common key servers
29 communication
30 communication scenarios
31 context
32 control
33 device association
34 devices
35 distance
36 distance bounding
37 eavesdropping
38 entity proximity
39 error rate
40 evaluation
41 focus
42 high error rates
43 human users
44 involvement
45 key certificates
46 key server
47 levels
48 malicious control
49 measurements
50 method
51 order
52 paper
53 past
54 practice
55 prior security context
56 process
57 promising set
58 proximity
59 public key certificates
60 radio channel
61 rate
62 region
63 region technique
64 research
65 results
66 scenarios
67 secrets
68 secure association
69 secure association – Integrity
70 security
71 security association techniques
72 security context
73 server
74 set
75 statistical analysis
76 study
77 such techniques
78 technique
79 thorough usability study
80 time
81 travel measurement
82 usability
83 usability evaluation
84 usability study
85 user involvement
86 user-aided security association techniques
87 users
88 variety
89 verification
90 wide variety
91 wireless communication
92 wireless devices
93 schema:name On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
94 schema:pagination 443-462
95 schema:productId N633c7de6aa674568bf241bbdbba55458
96 Ndb9d929ecc2e43b7bdeda7c79ba3db1d
97 schema:publisher N537912f04e1d4b99b73fea60608ca42b
98 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033096396
99 https://doi.org/10.1007/978-3-642-10433-6_30
100 schema:sdDatePublished 2021-12-01T20:04
101 schema:sdLicense https://scigraph.springernature.com/explorer/license/
102 schema:sdPublisher N743957f98db647f280e940e2c371c0f2
103 schema:url https://doi.org/10.1007/978-3-642-10433-6_30
104 sgo:license sg:explorer/license/
105 sgo:sdDataset chapters
106 rdf:type schema:Chapter
107 N07b02c6709ae4481a255514087aee9e3 rdf:first N3a2a2ddefd394932ab451cfb2e092fc4
108 rdf:rest N6ecee275db7e45a8bb0ef3dd6ac4bcf5
109 N33fa2e25563a40ce97e01d100f6fdae0 schema:familyName Garay
110 schema:givenName Juan A.
111 rdf:type schema:Person
112 N3a2a2ddefd394932ab451cfb2e092fc4 schema:familyName Miyaji
113 schema:givenName Atsuko
114 rdf:type schema:Person
115 N532c2c93678646c38b3752025539d9b7 rdf:first N33fa2e25563a40ce97e01d100f6fdae0
116 rdf:rest N07b02c6709ae4481a255514087aee9e3
117 N537912f04e1d4b99b73fea60608ca42b schema:name Springer Nature
118 rdf:type schema:Organisation
119 N633c7de6aa674568bf241bbdbba55458 schema:name doi
120 schema:value 10.1007/978-3-642-10433-6_30
121 rdf:type schema:PropertyValue
122 N6ecee275db7e45a8bb0ef3dd6ac4bcf5 rdf:first Nde20f989a9964bc9bb7d2de7a5093cfc
123 rdf:rest rdf:nil
124 N743957f98db647f280e940e2c371c0f2 schema:name Springer Nature - SN SciGraph project
125 rdf:type schema:Organization
126 Nd854334c644f498ca2cc8a58d8e8fc11 schema:isbn 978-3-642-10432-9
127 978-3-642-10433-6
128 schema:name Cryptology and Network Security
129 rdf:type schema:Book
130 Ndb9d929ecc2e43b7bdeda7c79ba3db1d schema:name dimensions_id
131 schema:value pub.1033096396
132 rdf:type schema:PropertyValue
133 Nde20f989a9964bc9bb7d2de7a5093cfc schema:familyName Otsuka
134 schema:givenName Akira
135 rdf:type schema:Person
136 Ne143b9d81fb6499d877e3cd3fbb7edd5 rdf:first sg:person.016301435711.11
137 rdf:rest Nf8509ae712d249e5a33c4b0e91024c64
138 Nee7dd97a8c684321a9c24951f4f7062f rdf:first sg:person.016065225667.49
139 rdf:rest rdf:nil
140 Nf8509ae712d249e5a33c4b0e91024c64 rdf:first sg:person.014472007601.70
141 rdf:rest Nee7dd97a8c684321a9c24951f4f7062f
142 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
143 schema:name Information and Computing Sciences
144 rdf:type schema:DefinedTerm
145 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
146 schema:name Data Format
147 rdf:type schema:DefinedTerm
148 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
149 schema:name Information Systems
150 rdf:type schema:DefinedTerm
151 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
152 schema:name Technology
153 rdf:type schema:DefinedTerm
154 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
155 schema:name Communications Technologies
156 rdf:type schema:DefinedTerm
157 sg:person.014472007601.70 schema:affiliation grid-institutes:None
158 schema:familyName Saxena
159 schema:givenName Nitesh
160 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014472007601.70
161 rdf:type schema:Person
162 sg:person.016065225667.49 schema:affiliation grid-institutes:grid.266093.8
163 schema:familyName Uzun
164 schema:givenName Ersin
165 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016065225667.49
166 rdf:type schema:Person
167 sg:person.016301435711.11 schema:affiliation grid-institutes:grid.38603.3e
168 schema:familyName Cagalj
169 schema:givenName Mario
170 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016301435711.11
171 rdf:type schema:Person
172 grid-institutes:None schema:alternateName Computer Science and Engineering, Polytechnic Institute of New York University
173 schema:name Computer Science and Engineering, Polytechnic Institute of New York University
174 rdf:type schema:Organization
175 grid-institutes:grid.266093.8 schema:alternateName Information and Computer Sciences, University of California, Irvine
176 schema:name Information and Computer Sciences, University of California, Irvine
177 rdf:type schema:Organization
178 grid-institutes:grid.38603.3e schema:alternateName FESB, University of Split, Croatia
179 schema:name FESB, University of Split, Croatia
180 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...