SECURING DEVICES COMMUNITIES IN SPONTANEOUS NETWORKS

Authors

  • Nicolas Prigent
  • Christophe Bidan

DOI:

https://doi.org/10.47839/ijc.4.2.335

Keywords:

Security, ad hoc networks, spontaneous networks, communities of devices, ubiquitous computing

Abstract

We define a community as a set of devices able to communicate permanently or erratically and that share a long term trust relation. Small corporate networks or home networks are typical examples of such communities. Historically, the devices of the same community communicated over physically isolated wired networks. They are currently used over spontaneous networks, the characteristics of which have implications, in terms of their security and the mechanisms that can be used to protect such. In this article, we present a fully decentralized service of automated configuration of the security mechanisms dedicated to communities of devices that communicate over spontaneous networks. This service is located on each device of the community and manages information related to the environment of the device and to the security policy. Based on this information, it configures dynamically and automatically the security services available on the device to ensure its security and that of the community to which it belongs.

References

Balfanz, D.; Smetters, D.; Stewart, P. & Wong, H. (2002), Talking to strangers: Authentication in ad hoc wireless networks, in 'Proceedings of the ISOC Network and Distributed Systems Security Symposium'.

Cahill, V.; Gray, E.; Seigneur, J.; Jensen, C.; Chen, Y.; Shand, B.; Dimmock, N.; Twigg, A.; Bacon, J.; English, C.; Wagealla, W.; Terzis, S.; Nixon, P.; Segurendo, G.d.M.; Bryce, C.; Carbone, M.; Krukow, K. & Nielsen, M. (2003), 'Using Trust for Secure Collaboration in Uncertain Environment', Pervasive Computing 2(3).

Capkun, S.; Hubaux, J.P. & Buttyan, L. (2003), Mobility helps Security in Ad Hoc Networks, in 'Proceedings of the Fourth International Symposium on Mobile Ad Hoc Networking and Computing'.

Cheswick, W.R.; Bellovin, S.M. & Rubin, A.D., Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA. (2003)

Corson, S. & Macker, J. (1999),'RFC 2501: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations'.

Feeney, L.; Ahlgren, B. & Westerlund, A. (2001), 'Spontaneous networking: an application-oriented approach to ad hoc networking', IEEE Communications Magazine.

Guttman, E., Autoconfiguration for IP Networking: Enabling Local Communication, IEEE Internet Computing 5(3), 81--86. (2001)

Legrand, V.; Galice, S.; Ubeda, S. & Neuville, J. (2005), Identification pour les reseaux spontanes, in 'Actes de la quatrieme conference sur la Securite et Architectures Reseaux (SAR 2005)'.

Montenegro, C. & Castelluccia, C. (2002), Statistically Unique and Cryptographically Verifiable (SUCV) identifiers and addresses, in 'NDSS'02'.

O'Shea, G. & Roe, M. (2001), 'Child-proof authentication MIPv6 (CAM)', ACM SIGCOMM Computer Communication Review 31(2), 4--8.

Perrig, A. & Song, D. (1999),Hash Visualization: a New Technique to improve Real-World Security, in 'International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99)', pp. 131--138.

Prigent, N.; Bidan, C.; Andreaux, J. & Heen, O. (2003),Secure Long Term Communities in Ad Hoc Networks, in 'Proceedings of the First ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN), held in association with the Tenth ACM Conference on Computer and Communication Security (CCS)'.

Prigent, N.; Bidan, C.; Heen, O. & Courtay, O. (2005), Configuration automatisee des services de securite de communautes d'appareils dans les reseaux spontanes, in 'Actes de la quatrieme conference sur la Securite des Architectures Reseaux (SAR 2005)'.

Stajano, F. (2001), 'The Resurrecting Duckling -- What Next?', Lecture Notes in Computer Science 2133, 204--211.

Downloads

Published

2014-08-01

How to Cite

Prigent, N., & Bidan, C. (2014). SECURING DEVICES COMMUNITIES IN SPONTANEOUS NETWORKS. International Journal of Computing, 4(2), 36-45. https://doi.org/10.47839/ijc.4.2.335

Issue

Section

Articles