Skip to main content

Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems

  • Conference paper
Security in Ad-hoc and Sensor Networks (ESAS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3313))

Included in the following conference series:

Abstract

Recent growth in the sales of Bluetooth-enabled handsets allows short-lived automated interactions between personal devices to become popular outside the research laboratories. In these new kinds of networks, automated data transfer between devices can now be achieved and there are many use cases, but a missing element is a consistent approach to the problem of risk management in automatic interactions. Access to centralized servers is not feasible, so security management will lie in the hands of end-users. We investigate the features present in these networks that could be used to mitigate risk and present existing research in the areas of ad hoc network security and distributed recommendation systems, discussing their potential for solving these problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anwitaman, D., Hauswirth, M., Aberer, K.: Beyond ”web of trust”: Enabling P2P E-commerce. In: Proceedings of the IEEE Conference on Electronic Commerce (CEC 2003), Newport Beach, California, USA, June 24-27 (2003)

    Google Scholar 

  2. Balfanz, D., Smetters, D., Stewart, P., ChiWong, H.: Talking to strangers - Authentication on ad-hoc wireless networks. In: Symposium on Network and Distributed Systems Security, San Diego, CA, USA (2002)

    Google Scholar 

  3. Bluetooth Special Interest Group: Bluetooth 1.1 Core specification (2002), available from: http://www.bluetooth.org/spec/

  4. Buchegger, S., Le Boudec, J.-Y.: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In: Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain (2002)

    Google Scholar 

  5. Dellarocas, C.: Building Trust Online - Design of Robust Reputation Reporting Mechanisms for Online Trading Communities (2002), Available from: http://ccs.mit.edu/dell/papers/ideabook.pdf

  6. Docouer, J.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Jakobsson, M., Wetzel, S.: Security Weaknesses. In: Bluetooth, RSA Conference, San Francisco, CA, USA (2001)

    Google Scholar 

  8. Kinateder, M., Rothermel, K.: Architecture and Algorithms for a Distributed Reputation System. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 1–16. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile ad hoc networks. In: Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking, Boston, MA, USA (2000)

    Google Scholar 

  10. Oasis Security Services TC, Security Assertion Markup Language (SAML) v1.1 (2003), available from: http://www.oasis-open.org/home/index.php

  11. Resnick, P., Zeckhauser, R., Swanson, J., Lockwood, K.: The Value of Reputation on eBay: A Controlled Experiment. In: Working paper presented at the ESA conference, Boston, MA, USA (2002)

    Google Scholar 

  12. Seigneur, J., Jensen, C., Farrell, S.S., Gray, E., Chen, Y.: Towards security auto-configuration for smart appliances. In: Smart Objects Conference, Grenoble, France (2003)

    Google Scholar 

  13. Shirey, R.: RFC 2828, Internet Security Glossary (2000)

    Google Scholar 

  14. Watts, D., Strogatz, S.: Collective dynamics of small world networks. Nature 393, 440–442 (1998)

    Article  Google Scholar 

  15. Yeager, W., Chen, R.: Poblano, A distributed Trust Model for JXTA, Sun Microsystems (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Moloney, S., Ginzboorg, P. (2005). Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds) Security in Ad-hoc and Sensor Networks. ESAS 2004. Lecture Notes in Computer Science, vol 3313. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30496-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30496-8_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24396-0

  • Online ISBN: 978-3-540-30496-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics