1. Security in PNs
- Author
-
Dimitris M. Kyriazanos, Hossam Afifi, Shahab Mirzadeh, Jan Stoter, Jordi Jaen Pallares, Neeli R. Prasad, Andreas Pashalidis, Antonietta Stango, Département Réseaux et Services Multimédia Mobiles (RS2M), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), Centre National de la Recherche Scientifique (CNRS), Institute of Communication and Computer Systems (ICCS), University of Surrey (UNIS), Fraunhofer Institute for Open Communication Systems (Fraunhofer FOKUS), Fraunhofer (Fraunhofer-Gesellschaft), NEC Europe Ltd., Network Laboratories, NEC Corporation, Department of Electronic Systems - Aalborg University, Aalborg University [Denmark] (AAU), Twente Institute of Wireless and Mobile Communications BV (University of Twente) (WMC), and Signals and Communication Technology
- Subjects
021110 strategic, defence & security studies ,Engineering ,Cloud computing security ,business.industry ,05 social sciences ,Internet privacy ,0211 other engineering and technologies ,02 engineering and technology ,Computer security model ,Computer security ,computer.software_genre ,Key features ,Security information and event management ,Security and privacy ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Security service ,Personal networks ,0502 economics and business ,Certificate authority ,Trust third party ,Message authentication code ,business ,computer ,050203 business & management - Abstract
International audience; A PN can provide the opportunity to personalize applications, services and the whole networking environment to the current needs of the user, making the security and privacy the key features in the PNs formation. In MAGNET Beyond the interest was concentrated on the importance of interactions between multiple PN users with common interests for various services, i.e. on PN Federation (PN-F). Establishing a PN Federation, the user should be able to control which information or services to share with others. For this reason the security is a very important aspect in PN-F as multiple people are involved and takes place at different levels: access to the PN Federation based on membership, secure transport of data within the federation and the access rights to resources and services of the federation. In this chapter, we present important contributions in the study of security of personal networks. To begin with, a threat analysis methodology tailored for PN and PN-F environments is described and applied to evaluate security. A reflection on user perspectives mapped onto security applications, privacy safeguarding and related protocols is encapsulated into the proposed Context Aware Security Manager component. Finally, we present a novel authentication protocol right tailored to specific low power devices needs
- Published
- 2009
- Full Text
- View/download PDF