Security associations in personal setworks: A comparative analysis

Jani Suomalainen, Jukka Valkonen, N. Asokan

    Research output: Book/ReportReport

    Abstract

    Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios and discuss how to mitigate them
    Original languageEnglish
    Publication statusPublished - 2007
    MoE publication typeD4 Published development or research report or study

    Publication series

    SeriesNokia Research Center Technical Report
    VolumeNRC-TR-2007-004

    Fingerprint

    Taxonomies
    Surveying
    Specifications
    Communication

    Keywords

    • personal networks
    • security association
    • standards
    • comparative survey
    • attacks

    Cite this

    Suomalainen, J., Valkonen, J., & Asokan, N. (2007). Security associations in personal setworks: A comparative analysis. Nokia Research Center Technical Report, Vol.. NRC-TR-2007-004
    Suomalainen, Jani ; Valkonen, Jukka ; Asokan, N. / Security associations in personal setworks: A comparative analysis. 2007. (Nokia Research Center Technical Report, Vol. NRC-TR-2007-004).
    @book{61247738851d455dabcf6caaa4e60d0a,
    title = "Security associations in personal setworks: A comparative analysis",
    abstract = "Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios and discuss how to mitigate them",
    keywords = "personal networks, security association, standards, comparative survey, attacks",
    author = "Jani Suomalainen and Jukka Valkonen and N. Asokan",
    year = "2007",
    language = "English",
    series = "Nokia Research Center Technical Report",

    }

    Suomalainen, J, Valkonen, J & Asokan, N 2007, Security associations in personal setworks: A comparative analysis. Nokia Research Center Technical Report, vol. NRC-TR-2007-004.

    Security associations in personal setworks: A comparative analysis. / Suomalainen, Jani; Valkonen, Jukka; Asokan, N.

    2007. (Nokia Research Center Technical Report, Vol. NRC-TR-2007-004).

    Research output: Book/ReportReport

    TY - BOOK

    T1 - Security associations in personal setworks: A comparative analysis

    AU - Suomalainen, Jani

    AU - Valkonen, Jukka

    AU - Asokan, N.

    PY - 2007

    Y1 - 2007

    N2 - Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios and discuss how to mitigate them

    AB - Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios and discuss how to mitigate them

    KW - personal networks

    KW - security association

    KW - standards

    KW - comparative survey

    KW - attacks

    M3 - Report

    T3 - Nokia Research Center Technical Report

    BT - Security associations in personal setworks: A comparative analysis

    ER -

    Suomalainen J, Valkonen J, Asokan N. Security associations in personal setworks: A comparative analysis. 2007. (Nokia Research Center Technical Report, Vol. NRC-TR-2007-004).