Security associations in personal networks: A comparative analysis

Jani Suomalainen, Jukka Valkonen, N. Asokan

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

24 Citations (Scopus)

Abstract

Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios. (18 refs.)
Original languageEnglish
Title of host publicationSecurity and Privacy in Ad-hoc and Sensor Networks, ESAS 2007
PublisherSpringer
Pages43-57
ISBN (Electronic)978-3-540-73275-4
ISBN (Print)978-3-540-73274-7
DOIs
Publication statusPublished - 2007
MoE publication typeA4 Article in a conference publication
Event4th European Workshop, ESAS 2007. Cambridge, UK, 2-3 July 2007 - Cambridge, United Kingdom
Duration: 2 Jul 20073 Jul 2007

Publication series

SeriesLecture Notes in Computer Science
Volume4572
ISSN0302-9743

Conference

Conference4th European Workshop, ESAS 2007. Cambridge, UK, 2-3 July 2007
Abbreviated titleESAS 2007
CountryUnited Kingdom
CityCambridge
Period2/07/073/07/07

Fingerprint

Taxonomies
Surveying
Specifications
Communication

Keywords

  • Personal networks
  • security association
  • survey

Cite this

Suomalainen, J., Valkonen, J., & Asokan, N. (2007). Security associations in personal networks: A comparative analysis. In Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007 (pp. 43-57). Springer. Lecture Notes in Computer Science, Vol.. 4572 https://doi.org/10.1007/978-3-540-73275-4_4
Suomalainen, Jani ; Valkonen, Jukka ; Asokan, N. / Security associations in personal networks : A comparative analysis. Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007. Springer, 2007. pp. 43-57 (Lecture Notes in Computer Science, Vol. 4572).
@inproceedings{da5d1924631d44928897b14f06a94f71,
title = "Security associations in personal networks: A comparative analysis",
abstract = "Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios. (18 refs.)",
keywords = "Personal networks, security association, survey",
author = "Jani Suomalainen and Jukka Valkonen and N. Asokan",
year = "2007",
doi = "10.1007/978-3-540-73275-4_4",
language = "English",
isbn = "978-3-540-73274-7",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "43--57",
booktitle = "Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007",
address = "Germany",

}

Suomalainen, J, Valkonen, J & Asokan, N 2007, Security associations in personal networks: A comparative analysis. in Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007. Springer, Lecture Notes in Computer Science, vol. 4572, pp. 43-57, 4th European Workshop, ESAS 2007. Cambridge, UK, 2-3 July 2007, Cambridge, United Kingdom, 2/07/07. https://doi.org/10.1007/978-3-540-73275-4_4

Security associations in personal networks : A comparative analysis. / Suomalainen, Jani; Valkonen, Jukka; Asokan, N.

Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007. Springer, 2007. p. 43-57 (Lecture Notes in Computer Science, Vol. 4572).

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

TY - GEN

T1 - Security associations in personal networks

T2 - A comparative analysis

AU - Suomalainen, Jani

AU - Valkonen, Jukka

AU - Asokan, N.

PY - 2007

Y1 - 2007

N2 - Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios. (18 refs.)

AB - Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios. (18 refs.)

KW - Personal networks

KW - security association

KW - survey

U2 - 10.1007/978-3-540-73275-4_4

DO - 10.1007/978-3-540-73275-4_4

M3 - Conference article in proceedings

SN - 978-3-540-73274-7

T3 - Lecture Notes in Computer Science

SP - 43

EP - 57

BT - Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007

PB - Springer

ER -

Suomalainen J, Valkonen J, Asokan N. Security associations in personal networks: A comparative analysis. In Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007. Springer. 2007. p. 43-57. (Lecture Notes in Computer Science, Vol. 4572). https://doi.org/10.1007/978-3-540-73275-4_4