Implementaion of key establishment protocol based on ultrasound distance bounding |
Feng Kai
|
Abstract | This thesis is to study the threat in the key establishment protocols in wireless networks and to implement a secure key establishment protocol in embedded system. The condentiality, integrity and authenticity becomes the major issues in the security of the key establishment protocols. Several existing solutions have been studied in this work. They use the help from public key cryptography or DH method to deal with condentiality. Message digest provide integrity. The authenticity is provided by several dierent ways. Distance bounding authenticator has been focused in this work. The key establishment protocol with distance bounding is thoroughly studied and analyzed. The implementation of this protocol is also described. The test shows the protocol implementation in this work is secure. |
Type | Master's thesis [Academic thesis] |
Year | 2006 |
Publisher | Informatics and Mathematical Modelling, Technical University of Denmark, DTU |
Address | Richard Petersens Plads, Building 321, DK-2800 Kgs. Lyngby |
Series | IMM-Thesis-2006-62 |
Note | Supervised by Srdjan Capkun, IMM. |
Electronic version(s) | [pdf] |
BibTeX data | [bibtex] |
IMM Group(s) | Computer Science & Engineering |