Securing ad hoc services, a Jini view: extended abstract


Problems with securing ad hoc services are discussed. How authentication and key exchange for ad hoc services can be performed will be shown. We use a simple trust model for the participants in an ad hoc network. We show how to create an authenticated secure ad hoc connection using, for example, the Java/Jini environment. 
DOI: 10.1145/514151.514174


1 Figure or Table