Beta 1


Title Implementaion of key establishment protocol based on ultrasound distance bounding
Author Kai, Feng
Supervisor Capkun, Srdjan (System Security, Department of Informatics and Mathematical Modeling, Technical University of Denmark, DTU, DK-2800 Kgs. Lyngby, Denmark)
Institution Technical University of Denmark, DTU, DK-2800 Kgs. Lyngby, Denmark
Thesis level Master's thesis
Year 2006
Abstract This thesis is to study the threat in the key establishment protocols in wireless networks and to implement a secure key establishment protocol in embedded system. The confidentiality, integrity and authenticity becomes the major issues in the security of the key establishment protocols. Several existing solutions have been studied in this work. They use the help from public key cryptography or DH method to deal with confidentiality. Message digest provide integrity. The authenticity is provided by several different ways. Distance bounding authenticator has been focused in this work. The key establishment protocol with distance bounding is thoroughly studied and analyzed. The implementation of this protocol is also described. The test shows the protocol implementation in this work is secure.
Note Supervised by Srdjan Capkun, IMM.
Fulltext
Original PDF imm4705.pdf (2.53 MB)
Admin Creation date: 2006-10-06    Update date: 2008-10-02    Source: dtu    ID: 191645    Original MXD