Skip to main content

The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1796))

Abstract

In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues for such an environment. Our discussion is based on the concrete example of a thermometer that makes its readings available to other nodes over the air. Some lessons learned from this example appear to be quite general to ad-hoc networks, and rather different from what we have come to expect in more conventional systems: denial of service, the goals of authentication, and the problems of naming all need re-examination. We present the resurrecting duckling security policy model, which describes secure transient association of a device with multiple serialised owners.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R., Kuhn, M.: Tamper resistance – a cautionary note. In: Proc. 2nd USENIX Workshop on Electronic Commerce (1996)

    Google Scholar 

  2. Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Infrared Data Association, http://www.irda.org/

  4. Bennett, F., Clarke, D., Evans, J.B., Hopper, A., Jones, A., Leask, D.: Piconet: Embedded mobile networking. IEEE Personal Communications 4(5), 8–15 (1997)

    Article  Google Scholar 

  5. Biba, K.J.: Integrity considerations for secure computer systems. Technical Report MTR-3153, MITRE Corporation(April 1975)

    Google Scholar 

  6. HomeRF Working Group, http://www.homerf.org/

  7. Haartsen, J., Naghshineh, M., Inouye, J., Joeressen, O.J., Allen, W.: Bluetooth: Visions, goals, and architecture. ACM Mobile Computing and Communications Review 2(4), 38–45 (1998)

    Article  Google Scholar 

  8. IEEE. IEEE standard for a high performance serial bus. IEEE Standard 1394 (1995)

    Google Scholar 

  9. Johnston, R.G., Garcia, A.R.E.: Vulnerability assessment of security seals. Journal of Security Administration 20(1), 15–27 (1997)

    Google Scholar 

  10. Lorenz, K.: Er redete mit dem Vieh, den Vögeln und den Fischen (King Solomon’s ring). Borotha-Schoeler, Wien (1949)

    Google Scholar 

  11. Sun Microsystems, http://java.sun.com/features/1998/03/rings.html

  12. Negus, K.J., Waters, J., Tourrilhes, J., Romans, C., Lansford, J., Hui, S.: HomeRF and SWAP: Wireless networking for the connected home. ACM Mobile Computing and Communications Review 2(4), 28–37 (1998)

    Article  Google Scholar 

  13. Bluetooth SIG, http://www.bluetooth.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stajano, F., Anderson, R. (2000). The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 1999. Lecture Notes in Computer Science, vol 1796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10720107_24

Download citation

  • DOI: https://doi.org/10.1007/10720107_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67381-1

  • Online ISBN: 978-3-540-45570-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics