Abstract
A PN can provide the opportunity to personalize applications, services and the whole networking environment to the current needs of the user, making the security and privacy the key features in the PNs formation.
In MAGNET Beyond the interest was concentrated on the importance of interactions between multiple PN users with common interests for various services, i.e. on PN Federation (PN-F). Establishing a PN Federation, the user should be able to control which information or services to share with others. For this reason the security is a very important aspect in PN-F as multiple people are involved and takes place at different levels: access to the PN Federation based on membership, secure transport of data within the federation and the access rights to resources and services of the federation.
In this chapter, we present important contributions in the study of security of personal networks. To begin with, a threat analysis methodology tailored for PN and PN-F environments is described and applied to evaluate security. A reflection on user perspectives mapped onto security applications, privacy safeguarding and related protocols is encapsulated into the proposed Context Aware Security Manager component. Finally, we present a novel authentication protocol right tailored to specific low power devices needs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Gritzalis, T. Karygiannis, C. Skianis (eds.), Security and Privacy in Mobile and Wireless Networking(Troubador Publishing, UK, Mar 2009)
A. Stango, N. Prasad, J.J. Pallares, Analysis, Verification and Evaluation, IST MAGNET deliverable D4.4.2, June 2008
A. Stango, D.M. Kyriazanos, N. Prasad, A threat analysis methodology for security evaluation and enhancement planning. Securware, Athens, June 2009
N.R. Prasad, Threat model framework and methodology for personal network. Communication Systems Software and Middleware, COMSWARE 2007
D.M. Kyriazanos et al., Specification of user profile, identity and role management for PNs and integration to the PN platform. IST MAGNET B deliverable D4.3.2, Mar 2007
S. Mirzadeh et al., Final version of the Network-Level Security Architecture Specification. IST MAGNET deliverable D4.3.2, Feb 2005
C.J. Mitchell, R. Schaffelhofer. The personal PKI, in Security for Mobility, ed. by C.J. Mitchell (IEE, London, UK, 2004), Chapter 3, pp. 35–61
L. Law, A. Menezes, M. Qu, J. Solinas, S. Vanstone, An efficient protocol for authenticated key agreement. Designs Codes Cryptogr. 28(2), 119–134 (2003)
D. Balfanz, D.K. Smetters, P. Stewart, H. Chi Wong. Talking to strangers: Authentication in ad-hoc wireless networks. Technical Report, Xerox Palo Alto Research Center, Palo Alto, 2002
NIST FIPS PUB 186–2, DIGITAL SIGNATURE STANDARD (DSS), Jan 2000
D. Johnson, A. Menezes, S. Vanstone, The elliptic curve digital signature algorithm (ECDSA), Int. J. Inf. Secur. 1(1), 36–63 (2001) – Springer
Fact Sheet NSA Suite B Cryptography, http://www.nsa.gov/ia/industry/crypto\_\_suite__b.cfm? MenuID = 10.2.7
D. Hankerson, A. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography(Springer-Verlag, New York, 2004)
M. Jacobsson et al., Specification of PN networking and security components. IST-MAGNET Beyond deliverable D2.3.1, Dec 2006
J. Hoebeke, G. Holderbeke, I. Moerman, M. Jacobsson, V. Prasad, C. Wangi, I. Niemegeers, S. Heemstra de Groot, Personal network federations, in Proceedings of the IST Mobile Summit 2006, Myconos, Greece, June 2006
M. Alutoin, S. Lehtonen, K. Ahola, J. Paananen, Personal network directory service, Telektronikk 103(1), 85–92 (2007)
A.J. Menezes, P.C.V. Oorschot, S.A. Vanstone, Handbook of Applied Cryptography(CRC Press, Boca Raton, FL, 1996), ISBN: 0-8493-8523-7
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this chapter
Cite this chapter
Afifi, H. et al. (2010). Security in PNs. In: Prasad, R. (eds) My personal Adaptive Global NET (MAGNET). Signals and Communication Technology. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3437-3_5
Download citation
DOI: https://doi.org/10.1007/978-90-481-3437-3_5
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3436-6
Online ISBN: 978-90-481-3437-3
eBook Packages: EngineeringEngineering (R0)