Procedure To Establish A Secure Self-Configured Environment For Data Distribution And Services Sharing Among Users

Syam Kumar Nallamothu, Amanatulla Mohammad, Sayeed Yasin

Abstract


A spontaneous network is a particular case of ad hocnetworks. They usually have little or no dependence on acentralized administration. Spontaneous networks can bewired or wireless. We regard as only wireless spontaneousnetworks in this paper. Their objective is the integration of services and devices in the same environment enabling theuser to have instant service without any external infrastructure.Because these networks are implemented indevices such as laptops, PDAs or mobile phones withlimited capacities they must use a lightweight protocol andnew methods to control manage and integrate them. To resolve mentioned securityissues we used an authentication phase and a trust phase. Moreover we presented a method to allow nodesto check the legitimacy of their IP addresses while notgenerating duplicated IP addresses. The mechanism helpsnodes to authenticate by using their IP addresses. We haveused this mechanism in the secure protocol presented inthis paper.


Keywords


Distributed protocol, secure protocol, spontaneous network, wireless ad hoc networks.

References


L.M. Feeney, B. Ahlgren, and A. Westerlund, “SpontaneousNetworking: An Application-Oriented Approach to Ad-hocNetworking,” IEEE Comm. Magazine, vol. 39, no. 6, pp. 176-181,June 2001.

J. Lloret, L. Shu, R. Lacuesta, and M. Chen, “User-Oriented andService-Oriented Spontaneous Ad Hoc and Sensor WirelessNetworks,” Ad Hoc and Sensor Wireless Networks, vol. 14, nos. 1/2, pp. 1-8, 2012.

S. Preuß and C.H. Cap, “Overview of Spontaneous Networking -Evolving Concepts and Technologies,” RostockerInformatik-Berichte, vol. 24, pp. 113-123, 2000.

R. Lacuesta, J. Lloret, M. Garcia, and L. Pen˜ alver, “A SpontaneousAd-Hoc Network to Share WWW Access,” EURASIP J. WirelessComm. and Networking, vol. 2010, article 18, 2010.

Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “ASurvey of Key Management Schemes in Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 11/12, pp. 2314-2341, Sept.2007.

V. Kumar and M.L. Das, “Securing Wireless Sensor Networkswith Public Key Techniques,” Ad Hoc and Sensor Wireless Networks,vol. 5, nos. 3/4, pp. 189-201, 2008.

S. Zhu, S. Xu, S. Setia, and S. Jajodia, “LHAP: A Lightweight Hopby-Hop Authentication Protocol For Ad-Hoc Networks,” Ad HocNetworks J., vol. 4, no. 5, pp. 567-585, Sept. 2006.

A. Noack and S. Spitz, “Dynamic Threshold Cryptosystemwithout Group Manager,” Network Protocols

and Algorithms,vol. 1, no. 1, Oct. 2009.

J. Yan, J. Ma, F. Li, and S.J. Moon, “Key Pre-distribution Schemewith Node Revocation for Wireless Sensor Networks,” Ad Hoc andSensor Wireless Networks, vol. 10, nos. 2/3, pp. 235-251, 2010.

M. Mukesh and K.R. Rishi, “Security Aspects in Mobile Ad HocNetwork (MANETs): Technical Review,” Int’l J. Computer Applications,vol. 12, no. 2, pp. 37-43, Dec. 2010.

K. Sahadevaiah and P.V.G.D. Prasad Reddy, “Impact of SecurityAttacks on a New Security Protocol for Mobile Ad Hoc Networks,”Network Protocols and Algorithms, vol 3, no. 4, pp. 122-140, 2011.

L. Herrero and R. Lacuesta, “A Security Architecture Proposal forSpontaneous Networks,” Proc. Int’l Conf. Advances in the InternetProcessing System and Interdisciplinary Research, Oct. 2003.


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.