Secure communication is difficult to arrange between devices that have not previously shared a secret. Previous solutions to the problem are susceptible to man-in-the-middle attacks, require additional hardware for out-of-band communication, or require an extensive public-key infrastructure. Furthermore, as the number of wireless devices explodes with the advent of the Internet of Things, it will be impractical to manually configure each device to communicate with its neighbors. Our system, CloseTalker, allows simple, secure, ad hoc communication between devices in close physical proximity, while jamming the signal so it is unintelligible to any receivers more than a few centimeters away. CloseTalker does not require any specialized hardwar...
Current security systems typically rely on the adversary's computational limitations (e.g., the fact...
Our society greatly depends on services and applications provided by mobile communication networks. ...
The worldwide use of handheld devices (personal digital assistants, cell phones, etc.) with wireless...
Secure communication is difficult to arrange between devices that have not previously shared a secre...
Analysts predict billions of everyday objects will soon become ``smart’\u27 after designers add wire...
Providing secure communications between wireless devices that encounter each other on an ad-hoc basi...
Forming secure associations between wireless devices that do not share a prior trust relationship is...
In a wireless system, transmitted electromagnetic waves can propagate in all directions and can be r...
The tremendous development in wireless technology has lead to accessing abundant information at one'...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
The proliferation of personal wireless devices requires secure connection between them. While it is ...
Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the con...
As wireless devices proliferate, in many situations we wish to authenticate devices by mere prox-imi...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...
Current security systems typically rely on the adversary's computational limitations (e.g., the fact...
Our society greatly depends on services and applications provided by mobile communication networks. ...
The worldwide use of handheld devices (personal digital assistants, cell phones, etc.) with wireless...
Secure communication is difficult to arrange between devices that have not previously shared a secre...
Analysts predict billions of everyday objects will soon become ``smart’\u27 after designers add wire...
Providing secure communications between wireless devices that encounter each other on an ad-hoc basi...
Forming secure associations between wireless devices that do not share a prior trust relationship is...
In a wireless system, transmitted electromagnetic waves can propagate in all directions and can be r...
The tremendous development in wireless technology has lead to accessing abundant information at one'...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
The proliferation of personal wireless devices requires secure connection between them. While it is ...
Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the con...
As wireless devices proliferate, in many situations we wish to authenticate devices by mere prox-imi...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...
Current security systems typically rely on the adversary's computational limitations (e.g., the fact...
Our society greatly depends on services and applications provided by mobile communication networks. ...
The worldwide use of handheld devices (personal digital assistants, cell phones, etc.) with wireless...