Skip to main content

The Trust Economy of Brief Encounters

  • Conference paper
  • 608 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7028))

Abstract

The security of ad-hoc networks has been a subject of academic study for about fifteen years. In the process it’s thrown up all sorts of provocative ideas, from Berkeley’s Smart Dust to our suicide bombing protocol [1,2]. Now that a number of ad-hoc network technologies are being deployed, it turns out that reality is even stranger. After giving an overview of the history, I’ll look at what some real systems teach us.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kahn, J., Katz, R., Pister, K.: Emerging Challenges: Mobile Networking for Smart Dust. Journal of Communications and Networks 2(3), 188–196 (2000)

    Google Scholar 

  2. Moore, T., Clulow, J., Nagaraja, S., Anderson, R.: New Strategies for Revocation in Ad-Hoc Networks. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 232–246. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Anderson, R.: The Eternity Service. In: Proceedings of Pragocrypt 1996, pp. 242–252 (1996)

    Google Scholar 

  4. Danezis, G., Anderson, R.: The Economics of Censorship Resistance. WEIS 2004 and in IEEE Security & Privacy, vol. 3(1), pp. 45–50 (2004)

    Google Scholar 

  5. Anderson, R.: The Initial Costs and Maintenance Costs of Protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol. 4631, pp. 336–343. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000), http://www.cl.cam.ac.uk/~rja14/duckling.html

    Chapter  Google Scholar 

  7. Anderson, R.: On the Security of Digital Tachographs. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 111–125. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  8. Newman, R., Gavette, S., Yonge, L., Anderson, R.: HomePlug AV Security Mechanisms. In: ISPLC 2007, pp. 366–371 (2007)

    Google Scholar 

  9. Anderson, R., Nagaraja, S.: The Topology of Covert Conflict. WEIS 2006; University of Cambridge Computer Laboratory technical report CL-637 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anderson, R. (2013). The Trust Economy of Brief Encounters. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds) Security Protocols XVII. Security Protocols 2009. Lecture Notes in Computer Science, vol 7028. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36213-2_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36213-2_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36212-5

  • Online ISBN: 978-3-642-36213-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics