Securing ad hoc services, a Jini view: extended abstract

  • Authors:
  • C. Gehrmann;P. Nikander

  • Affiliations:
  • Ericsson Research;Helsinki University of Technology

  • Venue:
  • MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

Problems with securing ad hoc services are discussed. How authentication and key exchange for ad hoc services can be performed will be shown. We use a simple trust model for the participants in an ad hoc network. We show how to create an authenticated secure ad hoc connection using, for example, the Java/Jini environment.