Identity-based association protocols for wireless personal area networks

Xin Huang, Paul Craig, Qinghua Wang

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

1 Citation (Scopus)

Abstract

Identity based infrastructure allows the public key of a user to be derived easily from a predefined aspect of their known identity such as a phone number, passport number or other universally unique identifier. Recently, Hölbl and Welzer have proposed an identity-based key establishment protocol. However, this protocol is found to be vulnerable to man-inthe-middle attacks and impersonation attacks. In this paper, we propose multi-channel identity based protocols for wireless personal area networks which can eliminate these attacks. These protocols alleviate the certificate overhead by using a public key infrastructure which is suitable for wireless personal area networks.

Original languageEnglish
Title of host publicationProceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
EditorsLuigi Atzori, Xiaolong Jin, Stephen Jarvis, Lei Liu, Ramon Aguero Calvo, Jia Hu, Geyong Min, Nektarios Georgalas, Yulei Wu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1819-1826
Number of pages8
ISBN (Electronic)9781509001545
DOIs
Publication statusPublished - 22 Dec 2015
Event15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015 - Liverpool, United Kingdom
Duration: 26 Oct 201528 Oct 2015

Publication series

NameProceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015

Conference

Conference15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
Country/TerritoryUnited Kingdom
CityLiverpool
Period26/10/1528/10/15

Keywords

  • Identity based protocol
  • Out-of-band channel
  • Security
  • Wireless sensor network

Cite this