@MASTERSTHESIS\{IMM2006-04705, author = "F. Kai", title = "Implementaion of key establishment protocol based on ultrasound distance bounding", year = "2006", school = "Informatics and Mathematical Modelling, Technical University of Denmark, {DTU}", address = "Richard Petersens Plads, Building 321, {DK-}2800 Kgs. Lyngby", type = "", note = "Supervised by Srdjan Capkun, {IMM}.", url = "http://www2.compute.dtu.dk/pubdb/pubs/4705-full.html", abstract = "This thesis is to study the threat in the key establishment protocols in wireless networks and to implement a secure key establishment protocol in embedded system. The con dentiality, integrity and authenticity becomes the major issues in the security of the key establishment protocols. Several existing solutions have been studied in this work. They use the help from public key cryptography or {DH} method to deal with con dentiality. Message digest provide integrity. The authenticity is provided by several di erent ways. Distance bounding authenticator has been focused in this work. The key establishment protocol with distance bounding is thoroughly studied and analyzed. The implementation of this protocol is also described. The test shows the protocol implementation in this work is secure." }