Abstract
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of an online authentication server. We introduced the Resurrecting Duckling security policy model to address this problem.
Master-slave relationships, however, do not exhaust the range of interesting interactions. We therefore extend the Duckling model to also cover relationships between peers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ross Anderson and Markus Kuhn. “Tamper Resistance—A Cautionary Note”. In “Proc. 2nd USENIX Workshop on Electronic Commerce”, 1996. ISBN 1-88044683-9. http://www.cl.cam.ac.uk/mgk25/tamper.pdf.
D. Elliot Bell and Leonard J. LaPadula. “Secure Computer Systems: Mathematical Foundations”. Mitre Report ESD-TR-73-278 (Vol. I–III), Mitre Corporation, Bedford, MA, Apr 1974.
Kenneth J. Biba. “Integrity Considerations for Secure Computer Systems”. Tech. Rep. MTR-3153, MITRE Corporation, Apr 1975.
Matt Blaze, Joan Feigenbaum, John Ioannidis and Angelos D. Keromytis. “The KeyNote Trust-Management System”. RFC 2704, Network Working Group, Sep 1999. http://www.crypto.com/papers/rfc2704.txt.
Matt Blaze, Joan Feigenbaum and Jack Lacy. “Decentralized Trust Management”. In “Proceedings of the 17 th IEEE Symp. on Security and Privacy”, pp. 164–173. IEEE Computer Society, 1996. ftp://ftp.research.att.com/dist/mab/policymaker.ps.
Joe M. Kahn, Randy H. Katz and Kris S. J. Pister. “Next Century Challenges: Mobile Networking for “Smart Dust””. In “Proceedings of International Conference on Mobile Computing and Networking (MobiCom 99)”, Seattle, WA, USA, Aug 1999. http://robotics.eecs.berkeley.edu/pister/publications/1999/ mobicom’99.pdf.
Frank Stajano and Ross Anderson. “The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks”. In Bruce Christianson, Bruno Crispo and Mike Roe (eds.), “Security Protocols, 7th International Workshop Proceedings”, Lecture Notes in Computer Science. Springer-Verlag, 1999. http://www.cl.cam.ac.uk/fms27/duckling/. See also [8]. Also available as AT&T Laboratories Cambridge Technical Report 1999.2.
Frank Stajano and Ross Anderson. “The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks”. In “Proceedings of 3rd AT&T Software Symposium”, Middletown, New Jersey, USA, Oct 1999. http://www.cl.cam.ac.uk/fms27/duckling/. Abridged and revised version of [7]. Also available as AT&T Laboratories Cambridge Technical Report 1999.2b.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stajano, F. (2001). The Resurrecting Duckling — What Next?. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2000. Lecture Notes in Computer Science, vol 2133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44810-1_27
Download citation
DOI: https://doi.org/10.1007/3-540-44810-1_27
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42566-3
Online ISBN: 978-3-540-44810-5
eBook Packages: Springer Book Archive