Authentication and Sharing Devices Using Social Networks

نویسندگان

  • Pravin Shankar
  • Badri Nath
  • Liviu Iftode
چکیده

(TODO: Old, needs to be rewritten.) Securing wireless networks and performing user-friendly seamless wireless authentication are considered mutually conflicting goals. In this paper we describe an architecture that lets typical users easily build a secure wireless network, while allowing user-friendly, seamless and persistent authentication, by making use of user identities and user trust relationships in online social networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SBone: Personal Device Sharing Using Social Networks∗

People own a number of personal devices whose state and resources might be of interest to others. Owners of these devices may be willing to selectively share them with their family, friends, and colleagues, but there exists no easy and secure mechanism to do so. In this paper, we propose SBone, an architecture that allows personal devices to share their resources and state with each other, seam...

متن کامل

Analysis of Iranian faculty information sharing in social networks: the case of Shahid Chamran University

Purpose. the purpose of this research is to analyze scientific information sharing of Shahid Chamran University of Ahvaz faculty in social networks.Method. This study which is conducted through quantitative and qualitative methods, is an applied research in terms of aim, and is of a descriptive-analytic type in nature. The population included all faculty members of Shahid Chamran Universi...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

WiFi Authentication through Social Networks

With the proliferation of WiFi-enabled devices, people expect to be able to use them everywhere, be it at work, while commuting, or when visiting friends. In the latter case, home owners are confronted with the burden of controlling the access to their WiFi router, and usually resort to simply sharing the password. Although convenient, this solution breaches basic security principles, and puts ...

متن کامل

Knowledge Sharing Behavior Model of Iranian Professionals in experts’ social networks: exploring indexes

Background and Aim: Due to the extensive use of knowledge intelligence, the future of countries depend on the application of specialized knowledge-based social networks. Thus, it is noteworthy to highlight the important role of the professionals. The key indicators of a model for knowledge sharing of Iranian experts, in experts’ social networks has been identified. Methods: For this purpose, ex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010