Bootstrapping Security in Personal Area Networks
نویسنده
چکیده
Providing key pre-distribution in personal area networks (PANs) remains a challenging problem, in particular because of the unique characteristics of, and constraints on, such networks. Several key pre-distribution schemes have been proposed for use in PANs, but these schemes only support key management within a PAN. In a ubiquitous environment, however, users with multiple personal wireless devices are likely to form mobile ad hoc networks, requiring key management between PANs. Moreover, PANs cannot rely on the universal accessibility of an online trusted third party, and PAN users are unlikely to delegate security operations to an external trusted party for privacy reasons. We thus propose a provably secure self-organising key pre-distribution scheme for use both within and between PANs.
منابع مشابه
Lightweight CoAP-Based Bootstrapping Service for the Internet of Things
The Internet of Things (IoT) is becoming increasingly important in several fields of industrial applications and personal applications, such as medical e-health, smart cities, etc. The research into protocols and security aspects related to this area is continuously advancing in making these networks more reliable and secure, taking into account these aspects by design. Bootstrapping is a proce...
متن کاملAnalysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks
Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...
متن کاملResearch on Building Family Networks Based on Bootstrapping and Coreference Resolution
Personal Family Network is an important component of social networks, therefore, it is of great importance of how to extract personal family relationships. We propose a novel method to construct personal families based on bootstrapping and coreference resolution on top of a search engine. It begins with seeds of personal relations to discover relational patterns in a bootstrapping fashion, then...
متن کاملApplying Generic Bootstrapping Architecture for use with Constrained Devices
This paper discusses the possible use and required modifications of the 3GPP Generic Authentication Architecture as a security framework for constrained devices within Internet of Things deployments. The deployment architecture in this paper assumes a cellular operator running the requires backend infrastructure and also providing the wide area network access over a cellular wireless broadband....
متن کاملTrust model, communication and configuration security for Personal Area Networks
This paper describes new security architecture for personal area networks (PANs). We give an overview of the PAN model we have used and the PAN security problems that we have tackled. The problem area is illustrated with a business meeting example. We base the security architecture on a new PAN reference model, which we describe. The trust model on which the security architecture is based is al...
متن کامل