Skip to main content

A New Framework for Building Secure Collaborative Systems in True Ad Hoc Network

  • Conference paper
Book cover Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2865))

Included in the following conference series:

  • 565 Accesses

Abstract

Many-to-Many Invocation (M2MI) is a new paradigm for building secure collaborative systems that run in true ad hoc networks of fixed and mobile computing devices. M2MI is useful for building a broad range of systems, including service discovery frameworks; groupware for mobile ad hoc collaboration; systems involving networked devices (printers, cameras, sensors); and collaborative middleware systems. M2MI provides an object oriented method call abstraction based on broadcasting. An M2MI invocation means “every object out there that implements this interface, call this method.” M2MI is layered on top of a new messaging protocol, the Many-to-Many Protocol (M2MP), which broadcasts messages to all nearby devices using the wireless network’s inherent broadcast nature instead of routing messages from device to device. In an M2MI-based system, central servers are not required; network administration is not required; complicated, resource-consuming ad hoc routing protocols are not required; and system development and deployment are simplified.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Capkun, S., Buttyan, L., Hubaux, J.: Self-organized public-key management for mobile ad hoc networks (2002)

    Google Scholar 

  2. Gelernter, D.: Generative communication in Linda. ACM Transactions on Programming. Languages and Systems 7(1), 80–112 (1985)

    Article  MATH  Google Scholar 

  3. Internet Engineering Task Force. IP Routing for Wireless/Mobile Hosts (mobileip) Working Group, http://www.ietf.org/html.charters/mobileip-charter.html

  4. Kaminsky, A., Bischof, H.-P.: Many-to-Many Invocation: A new object oriented paradigm for ad hoc collaborative systems. In: 17th Annual ACM Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2002), Onward! track (November 2002), (to appear) Preprint: http://www.cs.rit.edu/~anhinga/publications/publications.shtml

  5. Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proceedings of the 7th ACM conference on Computer and communications security, pp. 235–244 (2000)

    Google Scholar 

  6. Luo, H., Lu, S.: Ubiquitous and robust authentication services for ad hoc wireless networks (2000)

    Google Scholar 

  7. Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: A new approach to group key agreement. In: Proceedings of the 18th International Conference on Distributed Computing Systems (ICDCS 1998), Amsterdam, pp. 380–387. IEEE Computer Society Press, Los Alamitos (1998)

    Google Scholar 

  8. Jefferson, S.: Tuttle. Security in an Ad Hoc Network using Many-to-Many Invocation, http://www.cs.rit.edu/~jst1734

  9. Wollrath, A., Riggs, R., Waldo, J.: A distributed object model for the Java system. Computing Systems 9(4), 265–290 (1996)

    Google Scholar 

  10. Yoo, S.-M., Zhou, Z.-H.: All-to-all communication in wireless ad hoc networks. In: Proceedings of the 39th Annual ACM Southeast Conference, pp. 180-181 (March 2001), http://webster.cs.uga.edu/~jam/acm-se/review/abstract/syoo.ps

  11. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bischof, HP., Kaminsky, A., Binder, J. (2003). A New Framework for Building Secure Collaborative Systems in True Ad Hoc Network. In: Pierre, S., Barbeau, M., Kranakis, E. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2003. Lecture Notes in Computer Science, vol 2865. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39611-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39611-6_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20260-8

  • Online ISBN: 978-3-540-39611-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics