Abstract
The security of ad-hoc networks has been a subject of academic study for about fifteen years. In the process it’s thrown up all sorts of provocative ideas, from Berkeley’s Smart Dust to our suicide bombing protocol [1,2]. Now that a number of ad-hoc network technologies are being deployed, it turns out that reality is even stranger. After giving an overview of the history, I’ll look at what some real systems teach us.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kahn, J., Katz, R., Pister, K.: Emerging Challenges: Mobile Networking for Smart Dust. Journal of Communications and Networks 2(3), 188–196 (2000)
Moore, T., Clulow, J., Nagaraja, S., Anderson, R.: New Strategies for Revocation in Ad-Hoc Networks. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 232–246. Springer, Heidelberg (2007)
Anderson, R.: The Eternity Service. In: Proceedings of Pragocrypt 1996, pp. 242–252 (1996)
Danezis, G., Anderson, R.: The Economics of Censorship Resistance. WEIS 2004 and in IEEE Security & Privacy, vol. 3(1), pp. 45–50 (2004)
Anderson, R.: The Initial Costs and Maintenance Costs of Protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol. 4631, pp. 336–343. Springer, Heidelberg (2007)
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000), http://www.cl.cam.ac.uk/~rja14/duckling.html
Anderson, R.: On the Security of Digital Tachographs. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 111–125. Springer, Heidelberg (1998)
Newman, R., Gavette, S., Yonge, L., Anderson, R.: HomePlug AV Security Mechanisms. In: ISPLC 2007, pp. 366–371 (2007)
Anderson, R., Nagaraja, S.: The Topology of Covert Conflict. WEIS 2006; University of Cambridge Computer Laboratory technical report CL-637 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anderson, R. (2013). The Trust Economy of Brief Encounters. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds) Security Protocols XVII. Security Protocols 2009. Lecture Notes in Computer Science, vol 7028. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36213-2_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-36213-2_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36212-5
Online ISBN: 978-3-642-36213-2
eBook Packages: Computer ScienceComputer Science (R0)