Security associations in personal networks: A comparative analysis

Jani Suomalainen, Jukka Valkonen, N. Asokan

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    34 Citations (Scopus)

    Abstract

    Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios. (18 refs.)
    Original languageEnglish
    Title of host publicationSecurity and Privacy in Ad-hoc and Sensor Networks, ESAS 2007
    PublisherSpringer
    Pages43-57
    ISBN (Electronic)978-3-540-73275-4
    ISBN (Print)978-3-540-73274-7
    DOIs
    Publication statusPublished - 2007
    MoE publication typeA4 Article in a conference publication
    Event4th European Workshop, ESAS 2007. Cambridge, UK, 2-3 July 2007 - Cambridge, United Kingdom
    Duration: 2 Jul 20073 Jul 2007

    Publication series

    SeriesLecture Notes in Computer Science
    Volume4572
    ISSN0302-9743

    Conference

    Conference4th European Workshop, ESAS 2007. Cambridge, UK, 2-3 July 2007
    Abbreviated titleESAS 2007
    Country/TerritoryUnited Kingdom
    CityCambridge
    Period2/07/073/07/07

    Keywords

    • Personal networks
    • security association
    • survey

    Fingerprint

    Dive into the research topics of 'Security associations in personal networks: A comparative analysis'. Together they form a unique fingerprint.

    Cite this