Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different proposals to make this process of associating devices both easy-to-use and secure. Some of them have been adapted by emerging standard specifications. In this paper, we first present a taxonomy of protocols for creating security associations in personal networks. We then make use of this taxonomy in surveying and comparing association models proposed in several emerging standards. We also identify new potential attack scenarios and discuss how to mitigate the
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Abstract. Existing standards (ZigBee and Bluetooth Low Energy) for networked low-power wireless devi...
Introducing a new device to a network or to another device is one of the most security critical phas...
Introducing a new device to a network or to another device is one of the most security critical phas...
The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well ...
mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computin...
A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstand...
As computing devices become ubiquitous, devices are expected to encounter and associate with one ano...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
In this paper we evaluate our previously proposed security architecture for Personal Networks (PNs)....
Personal computing devices are becoming more and more popular. These devices are able to collaborate...
Two decades ago, two influential papers on key agreement in ad hoc settings set off a torrent of fol...
The Personal Network (PN) is a logical network of interconnected components used by an individual. I...
Social network sites have become de factor in establishing and maintaining good relationships across...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Abstract. Existing standards (ZigBee and Bluetooth Low Energy) for networked low-power wireless devi...
Introducing a new device to a network or to another device is one of the most security critical phas...
Introducing a new device to a network or to another device is one of the most security critical phas...
The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well ...
mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computin...
A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstand...
As computing devices become ubiquitous, devices are expected to encounter and associate with one ano...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
In this paper we evaluate our previously proposed security architecture for Personal Networks (PNs)....
Personal computing devices are becoming more and more popular. These devices are able to collaborate...
Two decades ago, two influential papers on key agreement in ad hoc settings set off a torrent of fol...
The Personal Network (PN) is a logical network of interconnected components used by an individual. I...
Social network sites have become de factor in establishing and maintaining good relationships across...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Abstract. Existing standards (ZigBee and Bluetooth Low Energy) for networked low-power wireless devi...