Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks
Post: #1



Security and privacy in mobile ad-hoc peer-to-peer environments are hard to attain, especially when working with passive objects without own processing power. We introduce a method for integrating such objects into a peer-to-peer environment without infrastructure components while providing a high level of privacy and security for peers interacting with objects. The integration is done by equipping passive objects with public keys, which can be used by peers to validate proxies acting on behalf of the objects. To overcome the problem of limited storage capacity on small embedded objects, ECC keys are used.

1 Introduction Currently, ad-hoc networks is a highly active research topic with many publications covering different aspects of this inter-disciplinary field (e.g. [15]). These aspects include, but are certainly not limited to, hardware (e.g. size, rugged design, power consumption, communication), software (e.g. operating system/platform, communication protocols, memory usage), interaction (e.g. interaction models, HCI aspects), security and application issues. In this paper, we will focus on privacy and security aspects of ad-hoc, peer-to-peer networks within the Smart Interaction project. The Smart Interaction project is an approach to interact with persons, things and places in a natural and non-obtrusive way. As for example people meet each other, their interaction profile is mutually compared in analogy to their natural, automatic choice of sympathy. Following the vastly successful way of human communication and coordination, the Peer-to-Peer (P2P) paradigm is used for direct communication among all participating devices. This offers complete device autonomy, independence of central authorities and reliability due to redundancy. Within the Smart Interaction project, this principle is even taken one step further by also being independent of any common communication infrastructure: we utilize solely ad-hoc wireless networks, currently either IEEE802.11b Wireless LAN (WLAN) or IEEE802.15.1 Bluetooth (BT). To match the flexibility of the P2P approach, local profiles describing the device capabilities, user attributes and preferences are kept on every peer. Upon spatial contact with other peers, these profiles provide the base for matching user interests and determining further, automatic coordination. Additionally, context constraints defined in profiles provide the necessary context awareness for ubiquitous applications; different situations, identified by context parameters, demand different behavior. As in any ubiquitous system, privacy and security are major concerns and are taken seriously by utilizing active and passive privacy control backed by strong cryptography. We do not aim to develop new cryptographic algorithms or novel security protocols, but instead utilize and combine well-known and secure techniques. However, we were unable to find protocols or methods for securely integrating passive objects without own processing capabilities into a P2P infrastructure. As this is an issue in our project, we developed a method to secure remote proxies that act on behalf of passive objects; this is our main contribution in the present work. The other aspects of the Smart Interaction project™s framework are only presented as far as necessary to understand the security aspect. This paper is organized as follows: In section 2, we start by shortly explaining the hard- and software environment the Smart Interaction project is situated in, including our definition of (passive) objects. Section 3 then gives an overview of related work, while section 4 presents our approach to P2P privacy and security between powerful peers. An addition to this approach to securely integrate (passive) objects with powerful peers “ the main contribution “ is presented in section 5. After that, we give a short conclusion and an outlook on our planned future research in section
Post: #2
More Info About determinig attributes to maximize visibilty of objects

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: mobile ad hoc networks, uml diagram for securing topology for sensor networks, mobile ad hoc networkingmobile ad hoc networks, peer to peer networks are scalable, passive optical networks, examples of peer to peer networks, search engine for 3d objects seminar ppt and documentation,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 1,317 07-10-2016 09:02 AM
Last Post: ijasti
  computer networks full report seminar topics 7 4,906 25-05-2016 02:07 PM
Last Post: dhanyavp
  broadband mobile full report project topics 7 2,108 27-02-2016 12:32 PM
Last Post: Prupleannuani
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 1,896 14-07-2015 02:24 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 12,248 01-05-2015 03:36 PM
Last Post: seminar report asees
  Mobile Train Radio Communication Electrical Fan 5 6,452 11-03-2015 07:27 PM
Last Post: Guest
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 1,576 26-02-2015 08:03 PM
Last Post: Guest
  Shallow Water Acoustic Networks (SWANs project report helper 2 1,090 24-03-2014 10:10 PM
Last Post: seminar report asees
  Bluetooth Based Smart Sensor Networks (Download Full Seminar Report) Computer Science Clay 75 48,963 16-02-2013 10:16 AM
Last Post: seminar details
  FACE RECOGNITION USING NEURAL NETWORKS (Download Seminar Report) Computer Science Clay 70 27,830 01-02-2013 09:28 PM
Last Post: Guest