Reputation-based Wi-Fi deployment protocols and security analysis.
Naouel Ben SalemJean-Pierre HubauxMarkus JakobssonPublished in: WMASH (2004)
Keyphrases
- security analysis
- wifi
- smart card
- authentication protocol
- key exchange
- security properties
- mutual authentication
- secure electronic
- mobile devices
- wireless networks
- wireless communication
- end to end
- security requirements
- public key
- location information
- ad hoc networks
- smart phones
- mobile applications
- information security
- encryption scheme
- mobile networks
- key distribution
- network architecture
- secret key
- sensor data
- low cost