Implementaion of key establishment protocol based on ultrasound distance bounding

Feng Kai

AbstractThis thesis is to study the threat in the key establishment protocols in wireless networks and to implement a secure key establishment protocol in embedded system. The con dentiality, integrity and authenticity becomes the major issues in the security of the key establishment protocols. Several existing solutions have been studied in this work. They use the help from public key cryptography or DH method to deal with con dentiality. Message digest provide integrity. The authenticity is provided by several di erent ways. Distance bounding authenticator has been focused in this work. The key establishment protocol with distance bounding is thoroughly studied and analyzed. The implementation of this protocol is also described. The test shows the protocol implementation in this work is secure.
TypeMaster's thesis [Academic thesis]
Year2006
PublisherInformatics and Mathematical Modelling, Technical University of Denmark, DTU
AddressRichard Petersens Plads, Building 321, DK-2800 Kgs. Lyngby
SeriesIMM-Thesis-2006-62
NoteSupervised by Srdjan Capkun, IMM.
Electronic version(s)[pdf]
BibTeX data [bibtex]
IMM Group(s)Computer Science & Engineering