SECURING DEVICES COMMUNITIES IN SPONTANEOUS NETWORKS
DOI:
https://doi.org/10.47839/ijc.4.2.335Keywords:
Security, ad hoc networks, spontaneous networks, communities of devices, ubiquitous computingAbstract
We define a community as a set of devices able to communicate permanently or erratically and that share a long term trust relation. Small corporate networks or home networks are typical examples of such communities. Historically, the devices of the same community communicated over physically isolated wired networks. They are currently used over spontaneous networks, the characteristics of which have implications, in terms of their security and the mechanisms that can be used to protect such. In this article, we present a fully decentralized service of automated configuration of the security mechanisms dedicated to communities of devices that communicate over spontaneous networks. This service is located on each device of the community and manages information related to the environment of the device and to the security policy. Based on this information, it configures dynamically and automatically the security services available on the device to ensure its security and that of the community to which it belongs.References
Balfanz, D.; Smetters, D.; Stewart, P. & Wong, H. (2002), Talking to strangers: Authentication in ad hoc wireless networks, in 'Proceedings of the ISOC Network and Distributed Systems Security Symposium'.
Cahill, V.; Gray, E.; Seigneur, J.; Jensen, C.; Chen, Y.; Shand, B.; Dimmock, N.; Twigg, A.; Bacon, J.; English, C.; Wagealla, W.; Terzis, S.; Nixon, P.; Segurendo, G.d.M.; Bryce, C.; Carbone, M.; Krukow, K. & Nielsen, M. (2003), 'Using Trust for Secure Collaboration in Uncertain Environment', Pervasive Computing 2(3).
Capkun, S.; Hubaux, J.P. & Buttyan, L. (2003), Mobility helps Security in Ad Hoc Networks, in 'Proceedings of the Fourth International Symposium on Mobile Ad Hoc Networking and Computing'.
Cheswick, W.R.; Bellovin, S.M. & Rubin, A.D., Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA. (2003)
Corson, S. & Macker, J. (1999),'RFC 2501: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations'.
Feeney, L.; Ahlgren, B. & Westerlund, A. (2001), 'Spontaneous networking: an application-oriented approach to ad hoc networking', IEEE Communications Magazine.
Guttman, E., Autoconfiguration for IP Networking: Enabling Local Communication, IEEE Internet Computing 5(3), 81--86. (2001)
Legrand, V.; Galice, S.; Ubeda, S. & Neuville, J. (2005), Identification pour les reseaux spontanes, in 'Actes de la quatrieme conference sur la Securite et Architectures Reseaux (SAR 2005)'.
Montenegro, C. & Castelluccia, C. (2002), Statistically Unique and Cryptographically Verifiable (SUCV) identifiers and addresses, in 'NDSS'02'.
O'Shea, G. & Roe, M. (2001), 'Child-proof authentication MIPv6 (CAM)', ACM SIGCOMM Computer Communication Review 31(2), 4--8.
Perrig, A. & Song, D. (1999),Hash Visualization: a New Technique to improve Real-World Security, in 'International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99)', pp. 131--138.
Prigent, N.; Bidan, C.; Andreaux, J. & Heen, O. (2003),Secure Long Term Communities in Ad Hoc Networks, in 'Proceedings of the First ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN), held in association with the Tenth ACM Conference on Computer and Communication Security (CCS)'.
Prigent, N.; Bidan, C.; Heen, O. & Courtay, O. (2005), Configuration automatisee des services de securite de communautes d'appareils dans les reseaux spontanes, in 'Actes de la quatrieme conference sur la Securite des Architectures Reseaux (SAR 2005)'.
Stajano, F. (2001), 'The Resurrecting Duckling -- What Next?', Lecture Notes in Computer Science 2133, 204--211.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.