Abstract
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues for such an environment. Our discussion is based on the concrete example of a thermometer that makes its readings available to other nodes over the air. Some lessons learned from this example appear to be quite general to ad-hoc networks, and rather different from what we have come to expect in more conventional systems: denial of service, the goals of authentication, and the problems of naming all need re-examination. We present the resurrecting duckling security policy model, which describes secure transient association of a device with multiple serialised owners.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R., Kuhn, M.: Tamper resistance – a cautionary note. In: Proc. 2nd USENIX Workshop on Electronic Commerce (1996)
Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1998)
Infrared Data Association, http://www.irda.org/
Bennett, F., Clarke, D., Evans, J.B., Hopper, A., Jones, A., Leask, D.: Piconet: Embedded mobile networking. IEEE Personal Communications 4(5), 8–15 (1997)
Biba, K.J.: Integrity considerations for secure computer systems. Technical Report MTR-3153, MITRE Corporation(April 1975)
HomeRF Working Group, http://www.homerf.org/
Haartsen, J., Naghshineh, M., Inouye, J., Joeressen, O.J., Allen, W.: Bluetooth: Visions, goals, and architecture. ACM Mobile Computing and Communications Review 2(4), 38–45 (1998)
IEEE. IEEE standard for a high performance serial bus. IEEE Standard 1394 (1995)
Johnston, R.G., Garcia, A.R.E.: Vulnerability assessment of security seals. Journal of Security Administration 20(1), 15–27 (1997)
Lorenz, K.: Er redete mit dem Vieh, den Vögeln und den Fischen (King Solomon’s ring). Borotha-Schoeler, Wien (1949)
Sun Microsystems, http://java.sun.com/features/1998/03/rings.html
Negus, K.J., Waters, J., Tourrilhes, J., Romans, C., Lansford, J., Hui, S.: HomeRF and SWAP: Wireless networking for the connected home. ACM Mobile Computing and Communications Review 2(4), 28–37 (1998)
Bluetooth SIG, http://www.bluetooth.com/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stajano, F., Anderson, R. (2000). The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 1999. Lecture Notes in Computer Science, vol 1796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10720107_24
Download citation
DOI: https://doi.org/10.1007/10720107_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67381-1
Online ISBN: 978-3-540-45570-7
eBook Packages: Springer Book Archive