Multi-channel Protocols

  • Ford-Long Wong
  • Frank Stajano
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4631)


We examine several ad-hoc pairing protocols that strengthen their radio exchanges with additional transmissions over another channel, for example a screen showing graphically encoded information to a camera. Additional channels may have limited capacity and may still be subject to eavesdropping, but they may offer specific advantages over radio such as data origin authenticity. A single protocol may profitably use more than one channel, each with its own specific security properties, for different messages in its trace. Making this option explicit allows for further advances in protocol design.

We also present an intriguing asymmetric protocol that achieves results comparable to mutual authentication even though the verification happens only in one direction.


Security Protocol Mutual Authentication Visual Channel Camera Phone Short Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad-hoc wireless networks. In: Network and Distributed System Security Symposium (February 2002)Google Scholar
  2. 2.
    Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. Tech. Rep. 39, DEC SRC (February 1989)Google Scholar
  3. 3.
    Gehrmann, C., Nyberg, K.: Enhancements to Bluetooth Baseband Security. In: Proc. Nordsec 2001 (November 2001)Google Scholar
  4. 4.
    Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. Cryptobytes 7(1), 29–37 (2004)Google Scholar
  5. 5.
    HighEnergyMagic. “SpotCode” (2004),
  6. 6.
    Hoepman, J.-H.: The Ephemeral Pairing Problem. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 212–226. Springer, Heidelberg (2004)Google Scholar
  7. 7.
    Kügler, D.: Man in the Middle Attacks on Bluetooth. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 149–161. Springer, Heidelberg (2003)Google Scholar
  8. 8.
    McCune, J.M., Perrig, A., Reiter, M.K.: Seeing is Believing: Using CameraPhones for Human-Verifiable Authentication. Tech. Rep. CMU-CS-04-174, Carnegie Mellon University (2004)Google Scholar
  9. 9.
    Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002)Google Scholar
  10. 10.
    Stajano, F., Anderson, R.: The Cocaine Auction Protocol — On The Power Of Anonymous Broadcast. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, Springer, Heidelberg (2000)CrossRefGoogle Scholar
  11. 11.
    Stajano, F., Anderson, R.: The Resurrecting Duckling — Security issues for Ad-Hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol. 1796, Springer, Heidelberg (2000)Google Scholar
  12. 12.
    Toye, E., Madhavapeddy, A., Sharp, R., Scott, D., Blackwell, A.: Using camera-phones to interact with context-aware mobile services. Tech. Rep. UCAM-CL-TR-609, University of Cambridge Computer Laboratory (December 2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Ford-Long Wong
    • 1
  • Frank Stajano
    • 1
  1. 1.University of Cambridge 

Personalised recommendations