Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Mathematical and computer modelling, 2012-06, Vol.55 (11-12), p.2107-2116
Ort / Verlag
Elsevier Ltd
Erscheinungsjahr
2012
Link zum Volltext
Quelle
Elsevier ScienceDirect Journals Complete
Beschreibungen/Notizen
Recently, many works have been focusing on solving the problem of privacy protection at link-layer level by randomizing all bits of the frames at link layer so that it makes difficult for unintended recipients to associate sequences of packets to their source transmitters. Most existing schemes however assume either the pre-setup for shared secrets between communication entities or the use of public-key infrastructure. These requirements limit the use of the schemes. In this paper, we describe new techniques for protecting the privacy and security of communication entities at wireless link-layer level. Our techniques have a number of crucial advantages. They mitigate the requirement of a key setup or a public-key infrastructure. They provide not only the link-layer privacy, but also the required security properties, including key compromise impersonation resilience, impersonation resistance and forward secrecy. They are simple and relatively fast.