Security associations in personal networks: A comparative analysis

Jani Suomalainen, Jukka Valkonen, N. Asokan

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

26 Citations (Scopus)


Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios. (18 refs.)
Original languageEnglish
Title of host publicationSecurity and Privacy in Ad-hoc and Sensor Networks, ESAS 2007
ISBN (Electronic)978-3-540-73275-4
ISBN (Print)978-3-540-73274-7
Publication statusPublished - 2007
MoE publication typeA4 Article in a conference publication
Event4th European Workshop, ESAS 2007. Cambridge, UK, 2-3 July 2007 - Cambridge, United Kingdom
Duration: 2 Jul 20073 Jul 2007

Publication series

SeriesLecture Notes in Computer Science


Conference4th European Workshop, ESAS 2007. Cambridge, UK, 2-3 July 2007
Abbreviated titleESAS 2007
CountryUnited Kingdom


  • Personal networks
  • security association
  • survey

Fingerprint Dive into the research topics of 'Security associations in personal networks: A comparative analysis'. Together they form a unique fingerprint.

Cite this