{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:46:01Z","timestamp":1743011161553,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030105907"},{"type":"electronic","value":"9783030105914"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":14,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this chapter we focus on two important security challenges that naturally emerge for large scale systems composed of cheap devices implementing only symmetric cryptographic algorithms. First, we consider threats due to poor or malicious implementations of protocols, which enable data to be leaked from the devices to an adversary. We present solutions based on a watchdog concept\u2014a man-in-the-middle device that does not know the secrets of the communicating parties, but aims to destroy covert channels leaking secret information. Second, we deal with the problem of tracing devices by means of information exchanged while establishing a communication session. As solutions such as Diffie-Hellman key exchange are unavailable for such devices, implicit identity information might be transmitted in clear and thereby provide a perfect means for privacy violations. We show how to reduce such risks without retreating to asymmetric algorithms.<\/jats:p>","DOI":"10.1007\/978-3-030-10591-4_1","type":"book-chapter","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T14:06:41Z","timestamp":1610633201000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Emerging Security Challenges for Ubiquitous Devices"],"prefix":"10.1007","author":[{"given":"Miros\u0142aw","family":"Kuty\u0142owski","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Syga","sequence":"additional","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Giuseppe Ateniese, Bernardo Magri, and Daniele Venturi. Subversion-resilient signature schemes. In Indrajit Ray, Ninghui Li, and Christopher Kruegel, editors, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12\u201316, 2015, pages 364\u2013375. ACM, 2015.","key":"1_CR31","DOI":"10.1145\/2810103.2813635"},{"issue":"1","key":"1_CR46","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1137\/S0097539795288490","volume":"29","author":"Yossi Azar","year":"1999","unstructured":"Yossi Azar, Andrei Z. Broder, Anna R. Karlin, and Eli Upfal. Balanced allocations. SIAM J. Comput., 29(1):180\u2013200, 1999.","journal-title":"SIAM J. Comput."},{"doi-asserted-by":"crossref","unstructured":"Matt Blaze. Looking on the bright side of black-box cryptography (transcript of discussion). In Security Protocols, 8th International Workshop, Cambridge, UK, April 3\u20135, 2000, Revised Papers, pages 54\u201361, 2000.","key":"1_CR94","DOI":"10.1007\/3-540-44810-1_9"},{"issue":"1","key":"1_CR97","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1145\/200836.200880","volume":"42","author":"Manuel Blum","year":"1995","unstructured":"Manuel Blum and Sampath Kannan. Designing programs that check their work. J. ACM, 42(1):269\u2013291, 1995.","journal-title":"J. ACM"},{"doi-asserted-by":"crossref","unstructured":"Stefan Brands and David Chaum. Distance-bounding protocols. In Tor Helleseth, editor, Advances in Cryptology \u2014 EUROCRYPT \u201993, pages 344\u2013359. Springer, 1994.","key":"1_CR112","DOI":"10.1007\/3-540-48285-7_30"},{"doi-asserted-by":"crossref","unstructured":"Seyit Ahmet \u00c7amtepe and B\u00fclent Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE\/ACM Trans. Netw., 15(2):346\u2013358, 2007.","key":"1_CR124","DOI":"10.1109\/TNET.2007.892879"},{"doi-asserted-by":"crossref","unstructured":"David Chaum and Torben P. Pedersen. Wallet databases with observers. In Ernest F. Brickell, editor, Advances in Cryptology - CRYPTO \u201992, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16\u201320, 1992, Proceedings, volume 740 of Lecture Notes in Computer Science, pages 89\u2013105. Springer, 1992.","key":"1_CR136","DOI":"10.1007\/3-540-48071-4_7"},{"key":"1_CR146","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.tcs.2012.06.001","volume":"453","author":"Jacek Cicho\u0144","year":"2012","unstructured":"Jacek Cicho\u0144, Zbigniew Golebiewski, and Miros\u0142aw Kuty\u0142owski. From key predistribution to key redistribution. Theor. Comput. Sci., 453:75\u201387, 2012.","journal-title":"Theor. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Jacek Cicho\u0144 and Miros\u0142aw Kuty\u0142owski. Anonymity and k-choice identities. In Dingyi Pei, Moti Yung, Dongdai Lin, and Chuankun Wu, editors, Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, volume 4990 of Lecture Notes in Computer Science, pages 283\u2013297. Springer, 2007.","key":"1_CR147","DOI":"10.1007\/978-3-540-79499-8_23"},{"doi-asserted-by":"crossref","unstructured":"Marek Klonowski, Miros\u0142aw Kuty\u0142owski, Micha\u0142 Ren, and Katarzyna Rybarczyk. Mixing in random digraphs with application to the forward-secure key evolution in wireless sensor networks. TOSN, 11(2):29:1\u201329:27, 2015.","key":"1_CR331","DOI":"10.1145\/2637482"},{"key":"1_CR332","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.adhoc.2017.01.003","volume":"59","author":"Marek Klonowski","year":"2017","unstructured":"Marek Klonowski and Piotr Syga. Enhancing privacy for ad hoc systems with predeployment key distribution. Ad Hoc Networks, 59:35\u201347, 2017.","journal-title":"Ad Hoc Networks"},{"unstructured":"Micha\u0142 Ren, Tanmoy Kanti Das, and Jianying Zhou. Diverging keys in wireless sensor networks. In Sokratis K. Katsikas, Javier L\u00f3pez, Michael Backes, Stefanos Gritzalis, and Bart Preneel, editors, Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, volume 4176 of Lecture Notes in Computer Science, pages 257\u2013269. Springer, 2006.","key":"1_CR499"},{"doi-asserted-by":"crossref","unstructured":"Alexander Russell, Qiang Tang, Moti Yung, and Hong-Sheng Zhou. Cliptography: Clipping the power of kleptographic attacks. In Jung Hee Cheon and Tsuyoshi Takagi, editors, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, volume 10032 of Lecture Notes in Computer Science, pages 34\u201364, 2016.","key":"1_CR510","DOI":"10.1007\/978-3-662-53890-6_2"},{"key":"1_CR590","volume-title":"Malicious cryptography - exposing cryptovirology","author":"Adam L Young","year":"2004","unstructured":"Adam L. Young and Moti Yung. Malicious cryptography - exposing cryptovirology. Wiley, 2004."}],"container-title":["Security of Ubiquitous Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10591-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,11]],"date-time":"2022-12-11T15:53:08Z","timestamp":1670773988000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-10591-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030105907","9783030105914"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10591-4_1","relation":{},"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"15 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}