Infrastructureless networks are becoming more popular with the increased prevalence of wireless networking technology. A significant challenge faced by these infrastructureless networks is that of providing security. In this paper we examine the issue of authentication, a fundamental component of most security approaches, and show how it can be performed despite an absence of trusted infrastructure and limited or no existing trust relationship between network nodes. Our approach enables nodes to authenticate using a combination of contextual information, harvested from the environment, and traditional authentication factors (such as public key cryptography). Underlying our solution is a generic threshold signature scheme that enables distri...
International audienceDue to the emergence of the Internet of Things (IoT) era and the rapid technol...
In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authen...
Ubiquitous computing is revolutionizing the way humans interact with machines and carry out everyday...
Modern systems are increasingly dependent on the integration of physical processes and information t...
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or dev...
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or dev...
Spontaneous interaction in ad-hoc networks is often desirable not only between users or devices in d...
The emergence of IoT poses new challenges towards solutions for authenticating numerous very heterog...
Abstract – The deficient of a good authentication protocol in a ubiquitous application environment h...
The concept of the Internet of Things is driven by advancements of the Internet with the interconnec...
The concept of the Internet of Things is driven by advancements of the Internet with the interconnec...
The concept of the Internet of Things is driven by advancements of the Internet with the interconnec...
context-aware computing, location-based computing, security, authentication This paper presents a pa...
International audienceDue to the emergence of the Internet of Things (IoT) era and the rapid technol...
The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-org...
International audienceDue to the emergence of the Internet of Things (IoT) era and the rapid technol...
In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authen...
Ubiquitous computing is revolutionizing the way humans interact with machines and carry out everyday...
Modern systems are increasingly dependent on the integration of physical processes and information t...
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or dev...
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or dev...
Spontaneous interaction in ad-hoc networks is often desirable not only between users or devices in d...
The emergence of IoT poses new challenges towards solutions for authenticating numerous very heterog...
Abstract – The deficient of a good authentication protocol in a ubiquitous application environment h...
The concept of the Internet of Things is driven by advancements of the Internet with the interconnec...
The concept of the Internet of Things is driven by advancements of the Internet with the interconnec...
The concept of the Internet of Things is driven by advancements of the Internet with the interconnec...
context-aware computing, location-based computing, security, authentication This paper presents a pa...
International audienceDue to the emergence of the Internet of Things (IoT) era and the rapid technol...
The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-org...
International audienceDue to the emergence of the Internet of Things (IoT) era and the rapid technol...
In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authen...
Ubiquitous computing is revolutionizing the way humans interact with machines and carry out everyday...