A Secure Group Membership Protocol
IEEE Transactions on Software Engineering
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
A call for the home media network
Communications of the ACM - How the virtual inspires the real
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Humans in the Loop: Human-Computer Interaction and Security
IEEE Security and Privacy
Spontaneous networking: an application oriented approach to ad hoc networking
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
Symbiotic Networks: Towards a New Level of Cooperation Between Wireless Networks
Wireless Personal Communications: An International Journal
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Autonomic security for home networks
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
Cryptographic protocol to establish trusted history of interactions
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Hi-index | 0.00 |
Until recently, ad hoc networks were mainly used for military and security-sensitive applications. Nowadays, they could also be used in SOHO (Small Office / Home Office) or home networks. In such networks, devices are linked by long term relations. To ensure their security, it is necessary to define precisely which devices belong to a given network and are consequently inside the security perimeter. The chosen mechanisms need to be easy to use, because the users of SOHO and home networks are neither willing nor able to configure the security of their network. In this paper, we present a new fully distributed approach for securing long term communities of devices in SOHO and home ad hoc networks that minimizes user intervention.