N Ghose, L Lazos, M Li - IEEE INFOCOM 2018-IEEE …, 2018 - ieeexplore.ieee.org
We address the problem of trust establishment between wireless devices that do not share any prior secrets. This includes the mutual authentication and agreement to a common key …
Physical layer message integrity protection and authentication by countering signal- cancellation has been shown as a promising alternative to traditional pure cryptographic …
N Ghose, L Lazos, M Li - IEEE Transactions on Mobile …, 2020 - ieeexplore.ieee.org
Many IoT devices lack the necessary interfaces (keyboards, screens) for entering passwords or changing default ones. For these devices, bootstrapping trust can be challenging. We …
T Tithi, B Deka, RM Gerdes, C Winstead… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
In this paper, we present friendly jamming for secure location verification of vehicles in Intelligent Transportation Systems (ITS). In friendly jamming confidential information is …
Secure Device Pairing (SDP) relies on an out-of-band channel to authenticate devices. This requires a common hardware interface, which limits the use of existing SDP systems. We …
N Ghose, L Lazos, M Li - 26th USENIX Security Symposium (USENIX …, 2017 - usenix.org
Bootstrapping trust between wireless devices without entering or preloading secrets is a fundamental security problem in many applications, including home networking, mobile …
N Ghose, L Lazos, M Li - 2018 IEEE Symposium on Security …, 2018 - ieeexplore.ieee.org
In this paper, we address the fundamental problem of securely bootstrapping a group of wireless devices to a hub, when none of the devices share prior associations (secrets) with …
Y Pan, Y Zheng, M Li - IEEE INFOCOM 2020-IEEE Conference …, 2020 - ieeexplore.ieee.org
Orthogonal blinding based schemes for wireless physical layer security aim to achieve secure communication by injecting noise into channels orthogonal to the main channel and …
X Xue, S Yu, M Song - IEEE INFOCOM 2023-IEEE Conference …, 2023 - ieeexplore.ieee.org
Bootstrapping security among wireless devices without prior-shared secrets is frequently demanded in emerging wireless and mobile applications. One promising approach for this …