Skip to main content
Book cover

Dynamic Secrets in Communication Security

  • Book
  • © 2014

Overview

  • Presents unique security properties and application studies for dynamic secrets
  • Compares dynamic secrets with conventional forms of secrets such as passwords and cryptographic keys using theoretical analysis and daily life analogies
  • Includes a case study on wireless medical devices and smart grid communications as examples for the practicality of dynamic secrets
  • Includes supplementary material: sn.pub/extras

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (8 chapters)

Keywords

About this book

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user’s password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

Reviews

From the reviews:

“It is based on the doctoral dissertation … completed by Sheng Xiao of the University of Massachusetts, Amherst, in the year 2013, under the guidance of Weibo Gong and Don Towsley. The work is intended for sophisticated students of computer science as well as electrical engineering. It is also meant for research workers and practitioners involved in network security and/or wireless communications. … The topics in the book are interesting. … I recommend the book for security enthusiasts.” (S. V. Nagaraj, Computing Reviews, April, 2014)

Authors and Affiliations

  • College of Information Science and Engineering, Hunan University, Changsha, China, People's Republic

    Sheng Xiao

  • Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, USA

    Weibo Gong, Don Towsley

Bibliographic Information

Publish with us