Standard-Nutzungsbedingungen:Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Zwecken und zum Privatgebrauch gespeichert und kopiert werden.Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich machen, vertreiben oder anderweitig nutzen.Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, gelten abweichend von diesen Nutzungsbedingungen die in der dort genannten Lizenz gewährten Nutzungsrechte. Terms of use: Documents in EconStor may
In an environment perturbed by malicious interference, establishing a reliable wireless connection without shared secrets typically relies on uncoordinated spread spectrum methods, such as UFHSS or UDSSS. These methods offer a lowthroughput channel for the exchange of key contributions with the goal to establish a shared secret. They, however, incur a significant delay when confronted with adversarial jamming, in particular when long public-key credentials must be exchanged. In this paper, we propose and evaluate a scheme that is orders of magnitude more efficient than prior proposals. Drawing on powerful identity-based (ID-based) cryptography and exploiting a-priori knowledge about the identities of the communication partners, the parties can immediately and without any communication derive a cryptographically strong seed (or key) for creating a highthroughput, jamming-resistant channel. Even without a-priori knowledge, our scheme still benefits from the certificate-free authentication offered by ID-based cryptography. Additionally, we define the notion of a secure seed establishment scheme for anti-jamming methods and prove that our protocol satisfies this definition. We further conduct an experimental evaluation of our approach to demonstrate its practicality: on mobile commodity hardware such as notebooks, tablet computers, and smart phones, a non-optimized implementation derives shared seeds in less than half a second. Permission to freely reproduce all or part of this paper for noncommercial purposes is granted provided that copies bear this notice and the full citation on the first page. Reproduction for commercial purposes is strictly prohibited without the prior written consent of the Internet Society, the first-named author (for reproduction of an entire paper only), and the author's employer if the paper was prepared within the scope of employment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.