Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2938559.2938581acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
demonstration
Public Access

Demo: Wanda, Securely Introducing Mobile Devices

Published: 25 June 2016 Publication History

Abstract

Nearly every setting is increasingly populated with wireless and mobile devices -- whether appliances in a home, medical devices in a health clinic, sensors in an industrial setting, or devices in an office or school. There are three fundamental operations when bringing a new device into any of these settings: (1) to configure the device to join the wireless local-area network, (2) to partner the device with other nearby devices so they can work together, and (3) to configure the device so it connects to the relevant individual or organizational account in the cloud. The challenge is to accomplish all three goals simply, securely, and consistent with user intent. We developed Wanda -- a `magic wand' that accomplishes all three of the above goals -- and will demonstrate a prototype implementation.

Reference

[1]
T. J. Pierson, X. Liang, R. Peterson, and D. Kotz. Wanda: securely introducing mobile devices. In IEEE International Conference on Computer Communications (INFOCOM), April 2016.

Cited By

View all
  • (2024)Exploring the applications and security threats of Internet of Thing in the cloud computing paradigmTransactions on Emerging Telecommunications Technologies10.1002/ett.489735:4Online publication date: 8-Apr-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiSys '16 Companion: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion
June 2016
172 pages
ISBN:9781450344166
DOI:10.1145/2938559
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 June 2016

Check for updates

Author Tags

  1. internet of things
  2. mobile devices
  3. security

Qualifiers

  • Demonstration

Funding Sources

Conference

MobiSys'16
Sponsor:

Acceptance Rates

Overall Acceptance Rate 274 of 1,679 submissions, 16%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)51
  • Downloads (Last 6 weeks)9
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Exploring the applications and security threats of Internet of Thing in the cloud computing paradigmTransactions on Emerging Telecommunications Technologies10.1002/ett.489735:4Online publication date: 8-Apr-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media