Standards for security associations in personal networks: A comparative analysis

Jani Suomalainen, Jukka Valkonen, N. Asokan

    Research output: Contribution to journalArticleScientificpeer-review

    26 Citations (Scopus)

    Abstract

    Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. It is particularly challenging to make this process of associating devices easy-to-use, secure and inexpensive at the same time. A cornerstone of this process is key establishment. In this paper, we first present a taxonomy of protocols for key establishment in personal networks as well as describe and analyse specific protocols. We then use this taxonomy in surveying and comparing association models proposed in several emerging standards from security, usability and implementability perspectives.
    Original languageEnglish
    Pages (from-to)87–100
    Number of pages14
    JournalInternational Journal of Security and Networks
    Volume4
    Issue number1/2
    DOIs
    Publication statusPublished - 2009
    MoE publication typeA1 Journal article-refereed

    Keywords

    • networks
    • security
    • personal networks
    • security association
    • standards
    • Bluetooth
    • Wi-Fi
    • WUSB
    • HomePlugAV
    • comparative survey
    • attacks.

    Fingerprint

    Dive into the research topics of 'Standards for security associations in personal networks: A comparative analysis'. Together they form a unique fingerprint.

    Cite this