Security associations in personal networks: A comparative analysis

Jani Suomalainen, Jukka Valkonen, N. Asokan

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    34 Citations (Scopus)


    Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios. (18 refs.)
    Original languageEnglish
    Title of host publicationSecurity and Privacy in Ad-hoc and Sensor Networks, ESAS 2007
    ISBN (Electronic)978-3-540-73275-4
    ISBN (Print)978-3-540-73274-7
    Publication statusPublished - 2007
    MoE publication typeA4 Article in a conference publication
    Event4th European Workshop, ESAS 2007. Cambridge, UK, 2-3 July 2007 - Cambridge, United Kingdom
    Duration: 2 Jul 20073 Jul 2007

    Publication series

    SeriesLecture Notes in Computer Science


    Conference4th European Workshop, ESAS 2007. Cambridge, UK, 2-3 July 2007
    Abbreviated titleESAS 2007
    Country/TerritoryUnited Kingdom


    • Personal networks
    • security association
    • survey


    Dive into the research topics of 'Security associations in personal networks: A comparative analysis'. Together they form a unique fingerprint.

    Cite this