{"title":"Case Study: Trust Establishment in Personal Area Networks","authors":"Yafei Yang, Lu Xiao, Yongjin Kim, D. Julian","doi":"10.1109/ISWPC.2009.4800572","DOIUrl":null,"url":null,"abstract":"Personal area networks (PANs) are gaining popularity. Authenticating the communication parties and securing the transmitted data have been recognized as an important but difficult problem. Since various devices are from different vendors and they may frequently join and leave a network, traditional key provision solutions can not tackle complicated and dynamic cases. In this paper, we proposed an effective approach of trust establishment and designed three modes to meet different requirements. The proposed scheme is evaluated through ample simulations and significant performance advantage is observed. With this approach, numerous personal devices can promptly build trust and get authentication.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"172 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 4th International Symposium on Wireless Pervasive Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISWPC.2009.4800572","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Personal area networks (PANs) are gaining popularity. Authenticating the communication parties and securing the transmitted data have been recognized as an important but difficult problem. Since various devices are from different vendors and they may frequently join and leave a network, traditional key provision solutions can not tackle complicated and dynamic cases. In this paper, we proposed an effective approach of trust establishment and designed three modes to meet different requirements. The proposed scheme is evaluated through ample simulations and significant performance advantage is observed. With this approach, numerous personal devices can promptly build trust and get authentication.