TY - GEN
T1 - Identity-based association protocols for wireless personal area networks
AU - Huang, Xin
AU - Craig, Paul
AU - Wang, Qinghua
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/12/22
Y1 - 2015/12/22
N2 - Identity based infrastructure allows the public key of a user to be derived easily from a predefined aspect of their known identity such as a phone number, passport number or other universally unique identifier. Recently, Hölbl and Welzer have proposed an identity-based key establishment protocol. However, this protocol is found to be vulnerable to man-inthe-middle attacks and impersonation attacks. In this paper, we propose multi-channel identity based protocols for wireless personal area networks which can eliminate these attacks. These protocols alleviate the certificate overhead by using a public key infrastructure which is suitable for wireless personal area networks.
AB - Identity based infrastructure allows the public key of a user to be derived easily from a predefined aspect of their known identity such as a phone number, passport number or other universally unique identifier. Recently, Hölbl and Welzer have proposed an identity-based key establishment protocol. However, this protocol is found to be vulnerable to man-inthe-middle attacks and impersonation attacks. In this paper, we propose multi-channel identity based protocols for wireless personal area networks which can eliminate these attacks. These protocols alleviate the certificate overhead by using a public key infrastructure which is suitable for wireless personal area networks.
KW - Identity based protocol
KW - Out-of-band channel
KW - Security
KW - Wireless sensor network
UR - http://www.scopus.com/inward/record.url?scp=84964282679&partnerID=8YFLogxK
U2 - 10.1109/CIT/IUCC/DASC/PICOM.2015.272
DO - 10.1109/CIT/IUCC/DASC/PICOM.2015.272
M3 - Conference Proceeding
AN - SCOPUS:84964282679
T3 - Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
SP - 1819
EP - 1826
BT - Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
A2 - Atzori, Luigi
A2 - Jin, Xiaolong
A2 - Jarvis, Stephen
A2 - Liu, Lei
A2 - Calvo, Ramon Aguero
A2 - Hu, Jia
A2 - Min, Geyong
A2 - Georgalas, Nektarios
A2 - Wu, Yulei
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
Y2 - 26 October 2015 through 28 October 2015
ER -