Team for Research in
Ubiquitous Secure Technology

Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups
Cynthia Kuo, Ahren Studer, Adrian Perrig

Citation
Cynthia Kuo, Ahren Studer, Adrian Perrig. "Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups". ACM Conference on Wireless Network Security (WiSec), ACM, April, 2008.

Abstract
Group communication is inherently a social activity. However, existing protocols for group key establishment often fail to consider important social dynamics. This paper examines the human requirements for wireless group key establishment. We identify seven social and situational factors which impact group formation, and we categorize common types of group communications into four classes of scenarios. Because of the different contextual factors, the different scenarios impose different requirements on wireless group key establishment. Existing group key establishment protocols do not handle two major (but unsolved) requirements: supporting polite behavior and resisting malicious insiders. We introduce how polite behavior may be incorporated into secure group communication.

Electronic downloads

Citation formats  
  • HTML
    Cynthia Kuo, Ahren Studer, Adrian Perrig. <a
    href="http://www.truststc.org/pubs/387.html"
    >Mind Your Manners: Socially Appropriate Wireless Key
    Establishment for Groups</a>, ACM Conference on
    Wireless Network Security (WiSec), ACM, April, 2008.
  • Plain text
    Cynthia Kuo, Ahren Studer, Adrian Perrig. "Mind Your
    Manners: Socially Appropriate Wireless Key Establishment for
    Groups". ACM Conference on Wireless Network Security
    (WiSec), ACM, April, 2008.
  • BibTeX
    @inproceedings{KuoStuderPerrig08_MindYourMannersSociallyAppropriateWirelessKeyEstablishment,
        author = {Cynthia Kuo and Ahren Studer and Adrian Perrig},
        title = {Mind Your Manners: Socially Appropriate Wireless
                  Key Establishment for Groups},
        booktitle = {ACM Conference on Wireless Network Security (WiSec)},
        organization = {ACM},
        month = {April},
        year = {2008},
        abstract = {Group communication is inherently a social
                  activity. However, existing protocols for group
                  key establishment often fail to consider important
                  social dynamics. This paper examines the human
                  requirements for wireless group key establishment.
                  We identify seven social and situational factors
                  which impact group formation, and we categorize
                  common types of group communications into four
                  classes of scenarios. Because of the different
                  contextual factors, the different scenarios impose
                  different requirements on wireless group key
                  establishment. Existing group key establishment
                  protocols do not handle two major (but unsolved)
                  requirements: supporting polite behavior and
                  resisting malicious insiders. We introduce how
                  polite behavior may be incorporated into secure
                  group communication.},
        URL = {http://www.truststc.org/pubs/387.html}
    }
    

Posted by Adrian Perrig on 2 May 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.