Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security Download File - Computer Networks & Information Security

mycnis.weebly.com
from mycnis.weebly.com More from this publisher
22.07.2013 Views

What’s New ? Wireless medium is easy to snoop on Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node (for instance, to obtain a secret key) Easier for trouble-makers to insert themselves into a mobile ad hoc network (as compared to a wired network) 398

Resurrecting Duckling [Stajano99] Battery exhaustion threat: A malicious node may interact with a mobile node often with the goal of draining the mobile node’s battery Authenticity: Who can a node talk to safely? Resurrecting duckling: Analogy based on a duckling and its mother. Apparently, a duckling assumes that the first object it hears is the mother A mobile device will trust first device which sends a secret key 399

What’s New ?<br />

Wireless medium is easy to snoop on<br />

Due to ad hoc connectivity and mobility, it is hard to<br />

guarantee access to any particular node (for<br />

instance, to obtain a secret key)<br />

Easier for trouble-makers to insert themselves into a<br />

mobile ad hoc network (as compared to a wired<br />

network)<br />

398

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!