Authentication and Sharing Devices Using Social Networks
نویسندگان
چکیده
(TODO: Old, needs to be rewritten.) Securing wireless networks and performing user-friendly seamless wireless authentication are considered mutually conflicting goals. In this paper we describe an architecture that lets typical users easily build a secure wireless network, while allowing user-friendly, seamless and persistent authentication, by making use of user identities and user trust relationships in online social networks.
منابع مشابه
SBone: Personal Device Sharing Using Social Networks∗
People own a number of personal devices whose state and resources might be of interest to others. Owners of these devices may be willing to selectively share them with their family, friends, and colleagues, but there exists no easy and secure mechanism to do so. In this paper, we propose SBone, an architecture that allows personal devices to share their resources and state with each other, seam...
متن کاملAnalysis of Iranian faculty information sharing in social networks: the case of Shahid Chamran University
Purpose. the purpose of this research is to analyze scientific information sharing of Shahid Chamran University of Ahvaz faculty in social networks.Method. This study which is conducted through quantitative and qualitative methods, is an applied research in terms of aim, and is of a descriptive-analytic type in nature. The population included all faculty members of Shahid Chamran Universi...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملWiFi Authentication through Social Networks
With the proliferation of WiFi-enabled devices, people expect to be able to use them everywhere, be it at work, while commuting, or when visiting friends. In the latter case, home owners are confronted with the burden of controlling the access to their WiFi router, and usually resort to simply sharing the password. Although convenient, this solution breaches basic security principles, and puts ...
متن کاملKnowledge Sharing Behavior Model of Iranian Professionals in experts’ social networks: exploring indexes
Background and Aim: Due to the extensive use of knowledge intelligence, the future of countries depend on the application of specialized knowledge-based social networks. Thus, it is noteworthy to highlight the important role of the professionals. The key indicators of a model for knowledge sharing of Iranian experts, in experts’ social networks has been identified. Methods: For this purpose, ex...
متن کامل