Title :
Securing ad hoc services, a Jini view
Author :
Gehrmann, C. ; Nikander, P.
Abstract :
Problems with securing ad hoc services are discussed. How authentication and key exchange for ad hoc services can be performed are shown. We use a simple trust model for the participants in an ad hoc network. We show how to create an authenticated secure ad hoc connection using, for example, the Java/Jini environment
Keywords :
Java; cryptography; land mobile radio; message authentication; radio networks; telecommunication computing; telecommunication security; Java/Jini environment; ad hoc services security; authenticated secure ad hoc connection; cryptography; key exchange; short range radio technologies; trust model; Access control; Ad hoc networks; Authentication; Bluetooth; Communication networks; Communication system security; Optical devices; Personal digital assistants; Public key; Public key cryptography;
Conference_Titel :
Mobile and Ad Hoc Networking and Computing, 2000. MobiHOC. 2000 First Annual Workshop on
Conference_Location :
Boston, MA
Print_ISBN :
0-7803-6534-8
DOI :
10.1109/MOBHOC.2000.869224