Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios. (18 refs.
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
Abstract. Existing standards (ZigBee and Bluetooth Low Energy) for networked low-power wireless devi...
Two decades ago, two influential papers on key agreement in ad hoc settings set off a torrent of fol...
Introducing a new device to a network or to another device is one of the most security critical phas...
Introducing a new device to a network or to another device is one of the most security critical phas...
Introducing a new device to a network or to another device is one of the most security critical phas...
The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well ...
mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computin...
As computing devices become ubiquitous, devices are expected to encounter and associate with one ano...
Personal computing devices are becoming more and more popular. These devices are able to collaborate...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
The Personal Network (PN) is a logical network of interconnected components used by an individual. I...
Social network sites have become de factor in establishing and maintaining good relationships across...
A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstand...
In this paper we evaluate our previously proposed security architecture for Personal Networks (PNs)....
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
Abstract. Existing standards (ZigBee and Bluetooth Low Energy) for networked low-power wireless devi...
Two decades ago, two influential papers on key agreement in ad hoc settings set off a torrent of fol...
Introducing a new device to a network or to another device is one of the most security critical phas...
Introducing a new device to a network or to another device is one of the most security critical phas...
Introducing a new device to a network or to another device is one of the most security critical phas...
The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well ...
mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computin...
As computing devices become ubiquitous, devices are expected to encounter and associate with one ano...
Personal computing devices are becoming more and more popular. These devices are able to collaborate...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
The Personal Network (PN) is a logical network of interconnected components used by an individual. I...
Social network sites have become de factor in establishing and maintaining good relationships across...
A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstand...
In this paper we evaluate our previously proposed security architecture for Personal Networks (PNs)....
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
Abstract. Existing standards (ZigBee and Bluetooth Low Energy) for networked low-power wireless devi...
Two decades ago, two influential papers on key agreement in ad hoc settings set off a torrent of fol...