Abstract
Many-to-Many Invocation (M2MI) is a new paradigm for building secure collaborative systems that run in true ad hoc networks of fixed and mobile computing devices. M2MI is useful for building a broad range of systems, including service discovery frameworks; groupware for mobile ad hoc collaboration; systems involving networked devices (printers, cameras, sensors); and collaborative middleware systems. M2MI provides an object oriented method call abstraction based on broadcasting. An M2MI invocation means “every object out there that implements this interface, call this method.” M2MI is layered on top of a new messaging protocol, the Many-to-Many Protocol (M2MP), which broadcasts messages to all nearby devices using the wireless network’s inherent broadcast nature instead of routing messages from device to device. In an M2MI-based system, central servers are not required; network administration is not required; complicated, resource-consuming ad hoc routing protocols are not required; and system development and deployment are simplified.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Capkun, S., Buttyan, L., Hubaux, J.: Self-organized public-key management for mobile ad hoc networks (2002)
Gelernter, D.: Generative communication in Linda. ACM Transactions on Programming. Languages and Systems 7(1), 80–112 (1985)
Internet Engineering Task Force. IP Routing for Wireless/Mobile Hosts (mobileip) Working Group, http://www.ietf.org/html.charters/mobileip-charter.html
Kaminsky, A., Bischof, H.-P.: Many-to-Many Invocation: A new object oriented paradigm for ad hoc collaborative systems. In: 17th Annual ACM Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2002), Onward! track (November 2002), (to appear) Preprint: http://www.cs.rit.edu/~anhinga/publications/publications.shtml
Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proceedings of the 7th ACM conference on Computer and communications security, pp. 235–244 (2000)
Luo, H., Lu, S.: Ubiquitous and robust authentication services for ad hoc wireless networks (2000)
Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: A new approach to group key agreement. In: Proceedings of the 18th International Conference on Distributed Computing Systems (ICDCS 1998), Amsterdam, pp. 380–387. IEEE Computer Society Press, Los Alamitos (1998)
Jefferson, S.: Tuttle. Security in an Ad Hoc Network using Many-to-Many Invocation, http://www.cs.rit.edu/~jst1734
Wollrath, A., Riggs, R., Waldo, J.: A distributed object model for the Java system. Computing Systems 9(4), 265–290 (1996)
Yoo, S.-M., Zhou, Z.-H.: All-to-all communication in wireless ad hoc networks. In: Proceedings of the 39th Annual ACM Southeast Conference, pp. 180-181 (March 2001), http://webster.cs.uga.edu/~jam/acm-se/review/abstract/syoo.ps
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bischof, HP., Kaminsky, A., Binder, J. (2003). A New Framework for Building Secure Collaborative Systems in True Ad Hoc Network. In: Pierre, S., Barbeau, M., Kranakis, E. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2003. Lecture Notes in Computer Science, vol 2865. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39611-6_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-39611-6_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20260-8
Online ISBN: 978-3-540-39611-6
eBook Packages: Springer Book Archive