Security associations in personal setworks: A comparative analysis

Jani Suomalainen, Jukka Valkonen, N. Asokan

Research output: Book/ReportReport

Abstract

Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios and discuss how to mitigate them
Original languageEnglish
Publication statusPublished - 2007
MoE publication typeD4 Published development or research report or study

Publication series

SeriesNokia Research Center Technical Report
VolumeNRC-TR-2007-004

Fingerprint

Taxonomies
Surveying
Specifications
Communication

Keywords

  • personal networks
  • security association
  • standards
  • comparative survey
  • attacks

Cite this

Suomalainen, J., Valkonen, J., & Asokan, N. (2007). Security associations in personal setworks: A comparative analysis. Nokia Research Center Technical Report, Vol.. NRC-TR-2007-004
Suomalainen, Jani ; Valkonen, Jukka ; Asokan, N. / Security associations in personal setworks: A comparative analysis. 2007. (Nokia Research Center Technical Report, Vol. NRC-TR-2007-004).
@book{61247738851d455dabcf6caaa4e60d0a,
title = "Security associations in personal setworks: A comparative analysis",
abstract = "Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios and discuss how to mitigate them",
keywords = "personal networks, security association, standards, comparative survey, attacks",
author = "Jani Suomalainen and Jukka Valkonen and N. Asokan",
year = "2007",
language = "English",
series = "Nokia Research Center Technical Report",

}

Suomalainen, J, Valkonen, J & Asokan, N 2007, Security associations in personal setworks: A comparative analysis. Nokia Research Center Technical Report, vol. NRC-TR-2007-004.

Security associations in personal setworks: A comparative analysis. / Suomalainen, Jani; Valkonen, Jukka; Asokan, N.

2007. (Nokia Research Center Technical Report, Vol. NRC-TR-2007-004).

Research output: Book/ReportReport

TY - BOOK

T1 - Security associations in personal setworks: A comparative analysis

AU - Suomalainen, Jani

AU - Valkonen, Jukka

AU - Asokan, N.

PY - 2007

Y1 - 2007

N2 - Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios and discuss how to mitigate them

AB - Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios and discuss how to mitigate them

KW - personal networks

KW - security association

KW - standards

KW - comparative survey

KW - attacks

M3 - Report

T3 - Nokia Research Center Technical Report

BT - Security associations in personal setworks: A comparative analysis

ER -

Suomalainen J, Valkonen J, Asokan N. Security associations in personal setworks: A comparative analysis. 2007. (Nokia Research Center Technical Report, Vol. NRC-TR-2007-004).