Browse Prior Art Database

Context depending transmission power / information / communication

IP.com Disclosure Number: IPCOM000130961D
Original Publication Date: 2005-Dec-10
Included in the Prior Art Database: 2005-Dec-10
Document File: 2 page(s) / 33K

Publishing Venue

Siemens

Related People

Juergen Carstens: CONTACT

Abstract

Wireless communication technology and to be more specific near field communication technology (NFC) may be used to communicate different types of information between different devices. This information can be configuration data, identification data, product information data and also security context parameters to be used to protect subsequent communication between different devices. Depending on the sensitivity of the data to be transmitted, the transmission power may be adopted to a pre-defined transmission power level at the sender's side. On the other hand, the receiver may check if the incoming signal was received with a lower power than specified by the pre-defined transmission power level. One example for NFC transmitting security related parameter might be during the Bluetooth pairing. Here, a key is sent between two Bluetooth-enabled devices, which is a long-term key. Based on this long-term key, session keys are derived for the actual and also for later sessions. Due to the relatively low radius of the NFC transmission, the bootstrapping procedure may be run in clear test, while security is provided by physical proximity. This eases the bootstrapping, as no pre-shared key or certificate is needed.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

S

Context depending transmission power / information / communication

Idea: Steffen Fries, DE-Munich; Csaba Korényi, DE-Munich; Michael Montag, DE-Munich

Wireless communication technology and to be more specific near field communication technology (NFC) may be used to communicate different types of information between different devices. This information can be configuration data, identification data, product information data and also security context parameters to be used to protect subsequent communication between different devices. Depending on the sensitivity of the data to be transmitted, the transmission power may be adopted to a pre-defined transmission power level at the sender's side. On the other hand, the receiver may check if the incoming signal was received with a lower power than specified by the pre-defined transmission power level.

One example for NFC transmitting security related parameter might be during the Bluetooth pairing. Here, a key is sent between two Bluetooth-enabled devices, which is a long-term key. Based on this long-term key, session keys are derived for the actual and also for later sessions. Due to the relatively low radius of the NFC transmission, the bootstrapping procedure may be run in clear test, while security is provided by physical proximity. This eases the bootstrapping, as no pre-shared key or certificate is needed.

Depending on the used NFC technology, e.g., RFID, the information may also be detectable over longer distances by an adversary having the appropriate equipment. Thus, a potential attacker may be able to "eavesdrop" the exchanged security parameters and misusing them for later attacks.

The described approach decreases the possibility for this type of eavesdropping attacks by reducing the transmission range of the sender. Additionally, the receiver may also check the electric field strength of the incoming signal to ensure that it is being received from a nearby device.

Therefore, devices, utilizing wireless communication technology (this might be RFID, Bluetooth, etc., but also infrared, or any other technology with a limited transmission range) can detect the exchange of security related / relevant data by an identifier describing the sensibility state of the data to be transmitted. This data transfer may be protected in different w...