Abstract
Home ad hoc networks are sets of devices that self-configure and interact to offer enhanced services to their users. These networks are heterogeneous, dynamic and fully decentralized. Moreover, they generally lack a skilled administrator. These properties dramatically reduce the efficiency of classical security approaches: even defining the boundaries of such networks can be difficult. A way to solve this problem has been recently proposed, using the concept of secure long-term communities. This solution relies on one critical operation: the secure insertion of a device in the home ad hoc network. In this article, we propose two ways to improve this operation, using store-and-forward techniques. The first improvement deals with the ability to achieve insertion under loose connectivity circumstances. The other improvement deals with the ability for the user to use any trusted device in order to realize the insertion, especially in heterogeneous networks.
Chapter PDF
References
D. Balfanz, D. Smetters, P. Stewart, and H. Wong. Talking to strangers: Authentication in adhoc wireless networks. In Proceedings of the ISOC Network and Distributed Systems Security Symposium, Feb. 2002.
Bluetooth Inc. Bluetooth core specification 1.1, 2001.
S. Capkun, L. Buttyan, and J.-P. Hubaux. Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1), January-March 2003.
S. Capkun, J. P. Hubaux, and L. Buttyan. Mobility helps security in ad hoc networks. In Proceedings of the Fourth International Symposium on Mobile Ad Hoc Networking and Computing, 2003.
E. Callaway et al. Home networking with IEEE 802.15.4 : a developing standard for low rate WPAN. IEEE Communications Magazine, pages 70–76, Aug. 2002.
L. Feeney, B. Ahlgren, and A. Westerlund. Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Communications Magazine, June 2001.
J. P. Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA, October 2001.
IEEE Standard Department. IEEE 802.11 Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY), 1999.
T. S. Messerges, J. Cukier, T. A. Kevenaar, L. Puhl, R. Struik, and E. Callaway. A security design for a general purpose, self-organizing, multihop ad hoc wireless network. In 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Oct. 2003.
C. Montenegro and C. Castelluccia. Statistically Unique and Cryptographically Verifiable (SUCV) identifiers and addresses. In NDSS’02, Feb. 2002.
G. O’Shea and M. Roe. Child-proof authentication for MIPv6 (CAM). ACM SIGCOMM Computer Communication Review, 31(2) :4–8, 2001.
A. Perrig and D. Song. Hash visualization: a new technique to improve realworld security. In International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC ’99), pages 131–138, 1999.
N. Prigent, J.-P. Andreaux, C. Bidan, and O. Heen. Secure long term communities in ad hoc networks. In 1 st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Oct. 2003.
F. Stajano. The Resurrecting Duckling — what next? Lecture Notes in Computer Science, 2133:204–211, 2001.
F. Stajano and R. Anderson. The Resurrecting Duckling: Security issues for ad-hoc wireless networks. In 7th International Workshop on Security Protocols, pages 172–194, 1999.
The UPnP Initiative. The UPnP Forum, http://www.upnp.org, 2004.
V. Cahill et al. Using trust for secure collaboration in uncertain environments. Pervasive Computing Mobile And Ubiquitous Computing, 2(3), July-September 2003.
L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24–30, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 IFIP International Federation for Information Processing
About this paper
Cite this paper
Heen, O., Andreaux, JP., Prigent, N. (2004). Improving Secure Device Insertion in Home Ad Hoc Networks. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds) Security and Protection in Information Processing Systems. SEC 2004. IFIP — The International Federation for Information Processing, vol 147. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8143-X_25
Download citation
DOI: https://doi.org/10.1007/1-4020-8143-X_25
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-8016-1
Online ISBN: 978-1-4020-8143-9
eBook Packages: Springer Book Archive