Problems with securing ad hoc services are discussed. How authentication and key exchange for ad hoc services can be performed will be shown. We use a simple trust model for the participants in an ad hoc network. We show how to create an authenticated secure ad hoc connection using, for example, the Java/Jini environment.
|Number of pages||2|
|Publication status||Published - 1 Jan 2000|
|Event||Workshop on Mobile and Ad Hoc Networking and Computing - Boston, United States|
Duration: 11 Aug 2000 → 11 Aug 2000
Conference number: 1
|Workshop||Workshop on Mobile and Ad Hoc Networking and Computing|
|Period||11/08/2000 → 11/08/2000|