Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
An evidential model of distributed reputation management
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Implementing a Reputation-Aware Gnutella Servent
Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing
The Resurrecting Duckling - What Next?
Revised Papers from the 8th International Workshop on Security Protocols
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Security-Aware Ad hoc Routing for Wireless Networks
Security-Aware Ad hoc Routing for Wireless Networks
Trust and Reputation Model in Peer-to-Peer Networks
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Key agreement in ad hoc networks
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Secure multi-agent system for multi-hop environments
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Hi-index | 0.01 |
Peer-to-Peer networks are set to have a major impact on mobile devices after having created hopes, hypes, revolutions and disillusions in desktop applications. Mobile phones equipped with close range connectivity like Bluetooth and WLAN have already hit the market and they are the natural target to form ad hoc networks. New scenarios could attract the fantasy (and the pocket) of the end users, but at what cost in terms of personal privacy and security? This provocative paper will examine the security threats posed by Peer-to-Peer and ad hoc networks in mobile devices and the solutions designed to fight them from an end user perspective. We question the real need of those solutions compared with their performance overhead and annoyance and we make some observations and suggestions on how to make security a user-centric effort.