The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Handbook of wireless networks and mobile computing
System Software for Ubiquitous Computing
IEEE Pervasive Computing
Agent-Based Context-Aware Ad hoc Communication
MATA '02 Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications
Relationship Management: Secure Collaboration in a Ubiquitous Environment
IEEE Pervasive Computing
Secure long term communities in ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Rapid and energy efficient neighbor discovery for spontaneous networks
MSWiM '04 Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
A security policy system for mobile autonomic networks
Proceedings of the 1st international conference on Autonomic computing and communication systems
A Secure Spontaneous Ad-Hoc Network to Share Internet Access
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
Survivable keying for wireless ad hoc networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Opportunistic resource utilization networks-A new paradigm for specialized ad hoc networks
Computers and Electrical Engineering
A socially inspired peer-to-peer resource discovery service for delay tolerant networks
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Design of the architecture for agent of the personality security in the ubiquitous environment
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
A spontaneous ad hoc network to share WWW access
EURASIP Journal on Wireless Communications and Networking
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
Multi-channel key agreement using encrypted public key exchange
Proceedings of the 15th international conference on Security protocols
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Applying component-based meta-service in liquid operating system for pervasive computing
ICESS'04 Proceedings of the First international conference on Embedded Software and Systems
Autonomic security for home networks
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
Improving energy efficiency and responsiveness in bluetooth networks: a performance assessment
NEW2AN'06 Proceedings of the 6th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
A Hybrid Network Emergency Communication Model
International Journal of Handheld Computing Research
Hi-index | 0.25 |
An ad hoc network must operate independent of a preestablished or centralized network management infrastructure, while still providing administrative services needed to support applications. Address allocation, name resolution, service location, authentication, and access control policies represent just some of the functionality that must be supported-without preconfiguration or centralized services. In order to solve these problems, it is necessary to leverage some aspect of the environment in which the network operates. We introduce the notion of a spontaneous network, created when a group of people come together for some collaborative activity. In this case, we can use the human interactions associated with the activity in order to establish a basic service and security infrastructure. We structure our discussion around a practical real-world scenario illustrating the use of such a network, identifying the key challenges involved and some of the techniques that can be used to address them