The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - April (2013 vol.24)
pp: 629-641
R. Lacuesta , Dept. de Inf. e Ing. de Sist., Univ. de Zaragoza, Ciudad Escolar, Spain
Jaime Lloret , Univ. Politec. de Valencia, Valencia, Spain
M. Garcia , Escuela Politec. Super. de Gandia, Valencia, Spain
L. Peñalver , Dept. de Inf. e Ing. de Sist., Univ. Politec. de Valencia, Valencia, Spain
ABSTRACT
This paper presents a secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. Trust is based on the first visual contact between users. Our proposal is a complete self-configured secure protocol that is able to create the network and share secure services without any infrastructure. The network allows sharing resources and offering new services among users in a secure environment. The protocol includes all functions needed to operate without any external support. We have designed and developed it in devices with limited resources. Network creation stages are detailed and the communication, protocol messages, and network management are explained. Our proposal has been implemented in order to test the protocol procedure and performance. Finally, we compare the protocol with other spontaneous ad hoc network protocols in order to highlight its features and we provide a security analysis of the system.
INDEX TERMS
Protocols, Authentication, Ad hoc networks, IP networks, Cryptography, Peer to peer computing, wireless ad hoc networks, Distributed protocol, secure protocol, spontaneous network
CITATION
R. Lacuesta, Jaime Lloret, M. Garcia, L. Peñalver, "A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation", IEEE Transactions on Parallel & Distributed Systems, vol.24, no. 4, pp. 629-641, April 2013, doi:10.1109/TPDS.2012.168
REFERENCES
[1] L.M. Feeney, B. Ahlgren, and A. Westerlund, "Spontaneous Networking: An Application-Oriented Approach to Ad-hoc Networking," IEEE Comm. Magazine, vol. 39, no. 6, pp. 176-181, June 2001.
[2] J. Lloret, L. Shu, R. Lacuesta, and M. Chen, "User-Oriented and Service-Oriented Spontaneous Ad Hoc and Sensor Wireless Networks," Ad Hoc and Sensor Wireless Networks, vol. 14, nos. 1/2, pp. 1-8, 2012.
[3] S. Preuß and C.H. Cap, "Overview of Spontaneous Networking - Evolving Concepts and Technologies," Rostocker Informatik-Berichte, vol. 24, pp. 113-123, 2000.
[4] R. Lacuesta, J. Lloret, M. Garcia, and L. Peñalver, "A Spontaneous Ad-Hoc Network to Share WWW Access," EURASIP J. Wireless Comm. and Networking, vol. 2010, article 18, 2010.
[5] Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A Survey of Key Management Schemes in Wireless Sensor Networks," Computer Comm., vol. 30, nos. 11/12, pp. 2314-2341, Sept. 2007.
[6] V. Kumar and M.L. Das, "Securing Wireless Sensor Networks with Public Key Techniques," Ad Hoc and Sensor Wireless Networks, vol. 5, nos. 3/4, pp. 189-201, 2008.
[7] S. Zhu, S. Xu, S. Setia, and S. Jajodia, "LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks," Ad Hoc Networks J., vol. 4, no. 5, pp. 567-585, Sept. 2006.
[8] A. Noack and S. Spitz, "Dynamic Threshold Cryptosystem without Group Manager," Network Protocols and Algorithms, vol. 1, no. 1, Oct. 2009.
[9] J. Yan, J. Ma, F. Li, and S.J. Moon, "Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks," Ad Hoc and Sensor Wireless Networks, vol. 10, nos. 2/3, pp. 235-251, 2010.
[10] M. Mukesh and K.R. Rishi, "Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review," Int'l J. Computer Applications, vol. 12, no. 2, pp. 37-43, Dec. 2010.
[11] K. Sahadevaiah and P.V.G.D. Prasad Reddy, "Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks," Network Protocols and Algorithms, vol 3, no. 4, pp. 122-140, 2011.
[12] L. Herrero and R. Lacuesta, "A Security Architecture Proposal for Spontaneous Networks," Proc. Int'l Conf. Advances in the Internet Processing System and Interdisciplinary Research, Oct. 2003.
[13] R. Lacuesta and L. Peñaver, "IP Addresses Configuration in Spontaneous Networks," Proc. Ninth WSEAS Int'l Conf. Computers (ICCOMP '05), July 2005.
[14] R. Lacuesta and L. Peñalver, "Automatic Configuration of Ad-Hoc Networks: Establishing Unique IP Link-Local Addresses," Proc. Int'l Conf. Emerging Security Information, Systems and Technologies (SECURWARE '07), 2007.
[15] J. Latvakoski, D. Pakkala, and P. Paakkonen, "A Communication Architecture for Spontaneous Systems," IEEE Wireless Comm., vol. 11, no. 3, pp. 36-42, June 2004.
[16] L. Liu, J. Xu, N. Antonopoulos, J. Li, and K. Wu, "Adaptive Service Discovery on Service-Oriented and Spontaneous Sensor Systems," Ad Hoc and Sensor Wireless Networks, vol. 14, nos. 1/2, pp. 107-132, 2012.
[17] S. Gallo, L. Galluccio, G. Morabito, and S. Palazzo, "Rapid and Energy Efficient Neighbor Discovery for Spontaneous Networks," Proc. Seventh ACM Int'l Symp. Modeling, Analysis and Simulation of Wireless and Mobile Systems, Oct. 2004.
[18] J. Bäckström and S. Nadjm-Tehrani, "Design of a Contact Service in a Jini-Based Spontaneous Network," Proc. Int'l Conf. and Exhibits on the Convergence of IT and Comm., Aug. 2001.
[19] V. Untz, M. Heusse, F. Rousseau, and A. Duda, "Lilith: an Interconnection Architecture Based on Label Switching for Spontaneous Edge Networks," Proc. First Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous '04), Aug. 2004.
[20] L.M. Feeney, B. Ahlgren, A. Westerlund, and A. Dunkels, "Spontnet: Experiences in Configuring and Securing Small Ad Hoc Networks," Proc. Fifth Int'l Workshop Network Appliances, Oct. 2002.
[21] M. Danzeisen, T. Braun, S. Winiker, D. Rodellar, "Implementation of a Cellular Framework for Spontaneous Network Establishment," Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05), Mar. 2005.
[22] J. Rekimoto, "SyncTap: Synchronous User Operation for Spontaneous Network Connection," Personal and Ubiquitous Computing, vol. 8, no. 2, pp. 126-134, May 2004.
[23] C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, "Anonysense: Privacy-Aware People-Centric Sensing," Proc. Sixth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '08), pp. 17-20, June 2008.
[24] R. Lacuesta, J. Lloret, M. Garcia, and L. Peñalver, "Two Secure and Energy-Saving Spontaneous Ad-Hoc Protocol for Wireless Mesh Client Networks," J. Network and Computer Applications, vol. 34, no. 2, pp. 492-505, Mar. 2011.
[25] J. Sun, C. Zhang, Y. Zhang, and Y. (Michael) Fang, "An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks," IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227-1239, Sept. 2010.
[26] FIPS 180-1 - Secure Hash Standard, SHA-1, "National Institute of Standards and Technology," http://www.itl.nist.gov/fipspubsfip180-1.htm , Feb. 27, 2012.
[27] A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Chang, "Energy Analysis for Public-Key Cryptography for Wireless Sensor Networks," Proc. IEEE Third Int'l Conf. Pervasive Computing and Comm. (PerCom '05), pp. 8-12, Mar. 2005.
[28] N.R. Potlapally, S. Ravi, A. Raghunathan, and N.K. Jha, "Analyzing the Energy Consumption of Security Protocols," Proc. Int'l Symp. Low Power Electronics and Design (ISLPED '03), 2003.
[29] J. Goodman and A. Chandrakasan, "An Energy Efficient Reconfigurable Public-Key Cryptography Processor Architecture," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '00), pp. 175-190, 2000.
[30] S. Landau, "Communications Security for the Twenty-First Century: The Advanced Encryption Standard," Notices of the Am. Math. Soc., vol. 47, no. 4, pp 450-459, Apr. 2000.
[31] J. López and R. Dahab, "Performance of Elliptic Curve Cryptosystems," Technical Report IC-00-08, May 2000.
[32] R. Mayrhofer, F. Ortner, A. Ferscha, and M. Hechinger, "Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks," Electronic Notes in Theoretical Computer Science, vol. 85, no. 3, pp. 105-121, Aug. 2003.
[33] S.E. Czerwinski, B.Y. Zhao, T.D. Hodes, A.D. Joseph, and R.H. Katz, "An Architecture for a Secure Service Discovery Service," Proc. ACM/IEEE MobiCom '99, Aug. 1999.
[34] L. Liu, J. Xu, N. Antonopoulos, J. Li, and K. Wu, "Adaptive Service Discovery on Service-Oriented and Spontaneous Sensor Systems," Adhoc and Sensor Wireless Networks, vol. 14, nos. 1/2, pp. 107-132, 2012.
[35] S. Capkun, L. Buttyan, and J.-P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.
[36] T. Czachorski and F. Pekergin, "Diffusion Approximation as a Modeling Tool in Congestion Control and Performance Evaluation," Proc. Second Int'l Working Conf. Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs '04), July 26-28, 2004.
[37] R. Lacuesta and L. Herrero, "A Good Use of Bluetooth, A Good Use of Bluetooth," Proc. Int'l Workshop Advanced Web Eng. for e-Business (AWEEB '04), Mar. 21, 2004.
[38] The Legion of the Bouncy Castle Website, at http:/www.bouncycastle.org, Feb. 2012.
[39] Netbeans website, at: http:/netbeans.org/, Feb. 2012.
[40] V.H. Zarate Silva, E.I. De la Cruz Salgado, and F. Ramos Quintana, "AWISPA: An Awareness Framework for Collaborative Spontaneous Networks," Proc. ASEE/IEEE 36th Frontiers in Education Conf., Oct. 2006.
54 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool