2007 IEEE Wireless Communications and Networking Conference 2007
DOI: 10.1109/wcnc.2007.579
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Secure Cluster Formation in Personal Networks

Abstract: In this paper we evaluate our previously proposed security architecture for Personal Networks (PNs). Personal Network is a new concept utilizing pervasive and distributed computing to meet the needs of the user. We aim to secure Personal Networks with lightweight security mechanisms that are suitable for resource constrained devices yet robust enough for self organization and secure communication. In order to study the behavior of our proposed security mechanisms we developed a simulation environment in NS-2. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Furthermore our design minimizes the transmission overhead of adding security by reducing the number of messages that need to be exchanged. In [23] we have validated the transmission cost of our proposed mechanisms by simulations in NS-2 [19]. Although our work is done in the context of Personal Networks, our proposals are relevant to other models [27] [28] in which constrained personal devices are networked over unreliable wireless links.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore our design minimizes the transmission overhead of adding security by reducing the number of messages that need to be exchanged. In [23] we have validated the transmission cost of our proposed mechanisms by simulations in NS-2 [19]. Although our work is done in the context of Personal Networks, our proposals are relevant to other models [27] [28] in which constrained personal devices are networked over unreliable wireless links.…”
Section: Discussionmentioning
confidence: 99%
“…In order to piggyback messages on top of cluster advertisements we define certain extension headers [23]. The entire cluster advertisement including the extension headers is protected by a MAC generated using the cluster key and another (known as MAC-H) using TESLA.…”
Section: Updating the Cluster Keymentioning
confidence: 99%
See 1 more Smart Citation
“…For this need, the solution proposed by Jehangir et al . could be integrated, which includes the role of a security agent in charge of distributing and refreshing cluster keys. Once intra‐cluster communications are secured, methods to interconnect clusters are required.…”
Section: Pn Standards and Integration Of Related Security Solutionsmentioning
confidence: 99%