Skip to main content

Security in PNs

  • Chapter
  • First Online:
My personal Adaptive Global NET (MAGNET)

Abstract

A PN can provide the opportunity to personalize applications, services and the whole networking environment to the current needs of the user, making the security and privacy the key features in the PNs formation.

In MAGNET Beyond the interest was concentrated on the importance of interactions between multiple PN users with common interests for various services, i.e. on PN Federation (PN-F). Establishing a PN Federation, the user should be able to control which information or services to share with others. For this reason the security is a very important aspect in PN-F as multiple people are involved and takes place at different levels: access to the PN Federation based on membership, secure transport of data within the federation and the access rights to resources and services of the federation.

In this chapter, we present important contributions in the study of security of personal networks. To begin with, a threat analysis methodology tailored for PN and PN-F environments is described and applied to evaluate security. A reflection on user perspectives mapped onto security applications, privacy safeguarding and related protocols is encapsulated into the proposed Context Aware Security Manager component. Finally, we present a novel authentication protocol right tailored to specific low power devices needs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Gritzalis, T. Karygiannis, C. Skianis (eds.), Security and Privacy in Mobile and Wireless Networking(Troubador Publishing, UK, Mar 2009)

    Google Scholar 

  2. A. Stango, N. Prasad, J.J. Pallares, Analysis, Verification and Evaluation, IST MAGNET deliverable D4.4.2, June 2008

    Google Scholar 

  3. A. Stango, D.M. Kyriazanos, N. Prasad, A threat analysis methodology for security evaluation and enhancement planning. Securware, Athens, June 2009

    Google Scholar 

  4. N.R. Prasad, Threat model framework and methodology for personal network. Communication Systems Software and Middleware, COMSWARE 2007

    Google Scholar 

  5. D.M. Kyriazanos et al., Specification of user profile, identity and role management for PNs and integration to the PN platform. IST MAGNET B deliverable D4.3.2, Mar 2007

    Google Scholar 

  6. S. Mirzadeh et al., Final version of the Network-Level Security Architecture Specification. IST MAGNET deliverable D4.3.2, Feb 2005

    Google Scholar 

  7. C.J. Mitchell, R. Schaffelhofer. The personal PKI, in Security for Mobility, ed. by C.J. Mitchell (IEE, London, UK, 2004), Chapter 3, pp. 35–61

    Google Scholar 

  8. L. Law, A. Menezes, M. Qu, J. Solinas, S. Vanstone, An efficient protocol for authenticated key agreement. Designs Codes Cryptogr. 28(2), 119–134 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  9. http://en.wikipedia.org/wiki/MQV

  10. D. Balfanz, D.K. Smetters, P. Stewart, H. Chi Wong. Talking to strangers: Authentication in ad-hoc wireless networks. Technical Report, Xerox Palo Alto Research Center, Palo Alto, 2002

    Google Scholar 

  11. NIST FIPS PUB 186–2, DIGITAL SIGNATURE STANDARD (DSS), Jan 2000

    Google Scholar 

  12. D. Johnson, A. Menezes, S. Vanstone, The elliptic curve digital signature algorithm (ECDSA), Int. J. Inf. Secur. 1(1), 36–63 (2001) – Springer

    Google Scholar 

  13. Fact Sheet NSA Suite B Cryptography, http://www.nsa.gov/ia/industry/crypto\_\_suite__b.cfm? MenuID = 10.2.7

  14. D. Hankerson, A. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography(Springer-Verlag, New York, 2004)

    MATH  Google Scholar 

  15. M. Jacobsson et al., Specification of PN networking and security components. IST-MAGNET Beyond deliverable D2.3.1, Dec 2006

    Google Scholar 

  16. J. Hoebeke, G. Holderbeke, I. Moerman, M. Jacobsson, V. Prasad, C. Wangi, I. Niemegeers, S. Heemstra de Groot, Personal network federations, in Proceedings of the IST Mobile Summit 2006, Myconos, Greece, June 2006

    Google Scholar 

  17. M. Alutoin, S. Lehtonen, K. Ahola, J. Paananen, Personal network directory service, Telektronikk 103(1), 85–92 (2007)

    Google Scholar 

  18. A.J. Menezes, P.C.V. Oorschot, S.A. Vanstone, Handbook of Applied Cryptography(CRC Press, Boca Raton, FL, 1996), ISBN: 0-8493-8523-7

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hossam Afifi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Afifi, H. et al. (2010). Security in PNs. In: Prasad, R. (eds) My personal Adaptive Global NET (MAGNET). Signals and Communication Technology. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3437-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3437-3_5

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3436-6

  • Online ISBN: 978-90-481-3437-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics