Advertisement

The Trust Economy of Brief Encounters

  • Ross Anderson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7028)

Abstract

The security of ad-hoc networks has been a subject of academic study for about fifteen years. In the process it’s thrown up all sorts of provocative ideas, from Berkeley’s Smart Dust to our suicide bombing protocol [1,2]. Now that a number of ad-hoc network technologies are being deployed, it turns out that reality is even stranger. After giving an overview of the history, I’ll look at what some real systems teach us.

Keywords

Security Protocol Reputation System Industrial Control System Covert Community Methyl Isocyanate 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kahn, J., Katz, R., Pister, K.: Emerging Challenges: Mobile Networking for Smart Dust. Journal of Communications and Networks 2(3), 188–196 (2000)Google Scholar
  2. 2.
    Moore, T., Clulow, J., Nagaraja, S., Anderson, R.: New Strategies for Revocation in Ad-Hoc Networks. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 232–246. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  3. 3.
    Anderson, R.: The Eternity Service. In: Proceedings of Pragocrypt 1996, pp. 242–252 (1996)Google Scholar
  4. 4.
    Danezis, G., Anderson, R.: The Economics of Censorship Resistance. WEIS 2004 and in IEEE Security & Privacy, vol. 3(1), pp. 45–50 (2004)Google Scholar
  5. 5.
    Anderson, R.: The Initial Costs and Maintenance Costs of Protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol. 4631, pp. 336–343. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
    Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000), http://www.cl.cam.ac.uk/~rja14/duckling.html CrossRefGoogle Scholar
  7. 7.
    Anderson, R.: On the Security of Digital Tachographs. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 111–125. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  8. 8.
    Newman, R., Gavette, S., Yonge, L., Anderson, R.: HomePlug AV Security Mechanisms. In: ISPLC 2007, pp. 366–371 (2007)Google Scholar
  9. 9.
    Anderson, R., Nagaraja, S.: The Topology of Covert Conflict. WEIS 2006; University of Cambridge Computer Laboratory technical report CL-637 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Ross Anderson
    • 1
  1. 1.University of Cambridge Computer LaboratoryUK

Personalised recommendations