Enhanced Protocol for data exchange through Natural Wireless Ad Hoc Networks

M Vamsi Krishna, R.Satya Ravindra Babu


This paper presents a secure protocol for spontaneous wireless ad hoc networks which uses a hybrid symmetric/ asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. Trust is based on the first visual contact between users. Our proposal is a complete self-configured secure protocol that is able to create the network and share secure services without any infrastructure.


L.M. Feeney, B. Ahlgren, and A. Westerlund, “Spontaneous Networking: An Application-Oriented Approach to Ad-hoc Networking,” IEEE Comm. Magazine, vol. 39, no. 6, pp. 176-181, June 2001.

J. Lloret, L. Shu, R. Lacuesta, and M. Chen, “User-Oriented and Service-Oriented Spontaneous Ad Hoc and Sensor Wireless Networks,” Ad Hoc and Sensor Wireless Networks, vol. 14, nos. 1/ 2, pp. 1-8, 2012.

S. Preuß and C.H. Cap, “Overview of Spontaneous Networking - Evolving Concepts and Technologies,” Rostocker Informatik- Berichte, vol. 24, pp. 113-123, 2000.

R. Lacuesta, J. Lloret, M. Garcia, and L. Pen˜ alver, “A Spontaneous Ad-Hoc Network to Share WWW Access,” EURASIP J. Wireless Comm. and Networking, vol. 2010, article 18, 2010.

Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A Survey of Key Management Schemes in Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 11/12, pp. 2314-2341, Sept. 2007.

V. Kumar and M.L. Das, “Securing Wireless Sensor Networks with Public Key Techniques,” Ad Hoc and Sensor Wireless Networks, vol. 5, nos. 3/4, pp. 189-201, 2008.

S. Zhu, S. Xu, S. Setia, and S. Jajodia, “LHAP: A Lightweight Hopby- Hop Authentication Protocol For Ad-Hoc Networks,” Ad Hoc Networks J., vol. 4, no. 5, pp. 567-585, Sept. 2006.

A. Noack and S. Spitz, “Dynamic Threshold Cryptosystem without Group Manager,” Network Protocols and Algorithms, vol. 1, no. 1, Oct. 2009.

J. Yan, J. Ma, F. Li, and S.J. Moon, “Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks,” Ad Hoc and Sensor Wireless Networks, vol. 10, nos. 2/3, pp. 235-251, 2010.



  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.