Abstract | ||
---|---|---|
Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. It is particularly challenging to make this process of associating devices easy-to-use, secure and inexpensive at the same time. A cornerstone of this process is key establishment. In this paper, we first present a taxonomy of protocols for key establishment in personal networks as well as describe and analyse specific protocols. We then use this taxonomy in surveying and comparing association models proposed in several emerging standards from security, usability and implementability perspectives. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1504/IJSN.2009.023428 | IJSN |
Keywords | Field | DocType |
networks,attacks.,wusb,comparative survey,security critical phase,security,comparative analysis,association model,wi-fi,homeplugav,standards,bluetooth,analyse specific protocol,key establishment,security association,implementability perspective,personal network,personal networks,new device,network security,usability,taxonomy,security associations | Wireless network,Telecommunications network,Computer security,Computer science,Usability,Security association,Key establishment,Network analysis,Cornerstone,Bluetooth | Journal |
Volume | Issue | Citations |
4 | 1/2 | 22 |
PageRank | References | Authors |
0.80 | 21 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
J. Suomalainen | 1 | 156 | 19.01 |
J. Valkonen | 2 | 22 | 0.80 |
N. Asokan | 3 | 2889 | 211.44 |