Abstract
Problems with securing ad hoc services are discussed. How authentication and key exchange for ad hoc services can be performed will be shown. We use a simple trust model for the participants in an ad hoc network. We show how to create an authenticated secure ad hoc connection using, for example, the Java/Jini environment.
Original language | English |
---|---|
Pages | 135-136 |
Number of pages | 2 |
DOIs | |
Publication status | Published - 1 Jan 2000 |
Event | Workshop on Mobile and Ad Hoc Networking and Computing - Boston, United States Duration: 11 Aug 2000 → 11 Aug 2000 Conference number: 1 |
Workshop
Workshop | Workshop on Mobile and Ad Hoc Networking and Computing |
---|---|
Abbreviated title | MobiHOC |
Country/Territory | United States |
City | Boston |
Period | 11/08/2000 → 11/08/2000 |