Out-of-band covert channels—A survey

B Carrara, C Adams - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
A novel class of covert channel, out-of-band covert channels, is presented by extending
Simmons' prisoners' problem. This new class of covert channel is established by surveying …

Examining the characteristics and implications of sensor side channels

V Subramanian, S Uluagac, H Cam… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
The nodes in wireless sensor networks (WSNs) utilize the radio frequency (RF) channel to
communicate. Given that the RF channel is the primary communication channel, many …

Secure initialization of multiple constrained wireless devices for an unaided user

T Perković, M Čagalj, T Mastelić, N Saxena… - IEEE transactions on …, 2012 - computer.org
A number of protocols and mechanisms have been proposed to address the problem of
initial secure key deployment in wireless networks. Most existing approaches work either …

Air-gap covert channels

B Carrara - 2016 - ruor.uottawa.ca
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert
channels, is defined as an unintentional communication channel established between …

Flashing displays: user‐friendly solution for bootstrapping secure associations between multiple constrained wireless devices

T Kovačević, T Perković… - Security and …, 2016 - Wiley Online Library
Future healthcare systems, smart homes, and similar will involve a large number of smart
inter‐connected wireless devices (such as wireless sensor nodes). One of the major …

Topology-driven secure initialization in wireless sensor networks: A tool-assisted approach

S Stelle, M Manulis, M Hollick - 2012 Seventh International …, 2012 - ieeexplore.ieee.org
Secure initialization of sensor nodes with cryptographic keys is inherent to all security
protocols and applicationsin the area of wireless sensor networks (WSN). We introduce a …

[PDF][PDF] User Friendly Authentication Mechanisms in User-to-Device and Device-to-Device Interactions

T Perković - 2013 - marjan.fesb.hr
Concerning the user-assisted device-to-device authentication problem (eg, setting up a
secure WiFi connection, secure initialization of a relatively large number of wireless sensor …

[引用][C] Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User