Abstract
Recent growth in the sales of Bluetooth-enabled handsets allows short-lived automated interactions between personal devices to become popular outside the research laboratories. In these new kinds of networks, automated data transfer between devices can now be achieved and there are many use cases, but a missing element is a consistent approach to the problem of risk management in automatic interactions. Access to centralized servers is not feasible, so security management will lie in the hands of end-users. We investigate the features present in these networks that could be used to mitigate risk and present existing research in the areas of ad hoc network security and distributed recommendation systems, discussing their potential for solving these problems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anwitaman, D., Hauswirth, M., Aberer, K.: Beyond ”web of trust”: Enabling P2P E-commerce. In: Proceedings of the IEEE Conference on Electronic Commerce (CEC 2003), Newport Beach, California, USA, June 24-27 (2003)
Balfanz, D., Smetters, D., Stewart, P., ChiWong, H.: Talking to strangers - Authentication on ad-hoc wireless networks. In: Symposium on Network and Distributed Systems Security, San Diego, CA, USA (2002)
Bluetooth Special Interest Group: Bluetooth 1.1 Core specification (2002), available from: http://www.bluetooth.org/spec/
Buchegger, S., Le Boudec, J.-Y.: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In: Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain (2002)
Dellarocas, C.: Building Trust Online - Design of Robust Reputation Reporting Mechanisms for Online Trading Communities (2002), Available from: http://ccs.mit.edu/dell/papers/ideabook.pdf
Docouer, J.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Jakobsson, M., Wetzel, S.: Security Weaknesses. In: Bluetooth, RSA Conference, San Francisco, CA, USA (2001)
Kinateder, M., Rothermel, K.: Architecture and Algorithms for a Distributed Reputation System. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 1–16. Springer, Heidelberg (2003)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile ad hoc networks. In: Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking, Boston, MA, USA (2000)
Oasis Security Services TC, Security Assertion Markup Language (SAML) v1.1 (2003), available from: http://www.oasis-open.org/home/index.php
Resnick, P., Zeckhauser, R., Swanson, J., Lockwood, K.: The Value of Reputation on eBay: A Controlled Experiment. In: Working paper presented at the ESA conference, Boston, MA, USA (2002)
Seigneur, J., Jensen, C., Farrell, S.S., Gray, E., Chen, Y.: Towards security auto-configuration for smart appliances. In: Smart Objects Conference, Grenoble, France (2003)
Shirey, R.: RFC 2828, Internet Security Glossary (2000)
Watts, D., Strogatz, S.: Collective dynamics of small world networks. Nature 393, 440–442 (1998)
Yeager, W., Chen, R.: Poblano, A distributed Trust Model for JXTA, Sun Microsystems (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Moloney, S., Ginzboorg, P. (2005). Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds) Security in Ad-hoc and Sensor Networks. ESAS 2004. Lecture Notes in Computer Science, vol 3313. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30496-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-30496-8_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24396-0
Online ISBN: 978-3-540-30496-8
eBook Packages: Computer ScienceComputer Science (R0)