Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project report tiger
Active In SP

Posts: 1,062
Joined: Feb 2010
06-02-2010, 08:27 AM

.pdf   Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks.pdf (Size: 468.96 KB / Downloads: 90)


Security and privacy in mobile ad-hoc peer-to-peer environments are hard to attain, especially when working with passive objects without own processing power. We introduce a method for integrating such objects into a peer-to-peer environment without infrastructure components while providing a high level of privacy and security for peers interacting with objects. The integration is done by equipping passive objects with public keys, which can be used by peers to validate proxies acting on behalf of the objects. To overcome the problem of limited storage capacity on small embedded objects, ECC keys are used.

1 Introduction Currently, ad-hoc networks is a highly active research topic with many publications covering different aspects of this inter-disciplinary field (e.g. [15]). These aspects include, but are certainly not limited to, hardware (e.g. size, rugged design, power consumption, communication), software (e.g. operating system/platform, communication protocols, memory usage), interaction (e.g. interaction models, HCI aspects), security and application issues. In this paper, we will focus on privacy and security aspects of ad-hoc, peer-to-peer networks within the Smart Interaction project and implimentation. The Smart Interaction project and implimentation is an approach to interact with persons, things and places in a natural and non-obtrusive way. As for example people meet each other, their interaction profile is mutually compared in analogy to their natural, automatic choice of sympathy. Following the vastly successful way of human communication and coordination, the Peer-to-Peer (P2P) paradigm is used for direct communication among all participating devices. This offers complete device autonomy, independence of central authorities and reliability due to redundancy. Within the Smart Interaction project and implimentation, this principle is even taken one step further by also being independent of any common communication infrastructure: we utilize solely ad-hoc wireless networks, currently either IEEE802.11b Wireless LAN (WLAN) or IEEE802.15.1 Bluetooth (BT). To match the flexibility of the P2P approach, local profiles describing the device capabilities, user attributes and preferences are kept on every peer. Upon spatial contact with other peers, these profiles provide the base for matching user interests and determining further, automatic coordination. Additionally, context constraints defined in profiles provide the necessary context awareness for ubiquitous applications; different situations, identified by context parameters, demand different behavior. As in any ubiquitous system, privacy and security are major concerns and are taken seriously by utilizing active and passive privacy control backed by strong cryptography. We do not aim to develop new cryptographic algorithms or novel security protocols, but instead utilize and combine well-known and secure techniques. However, we were unable to find protocols or methods for securely integrating passive objects without own processing capabilities into a P2P infrastructure. As this is an issue in our project and implimentation, we developed a method to secure remote proxies that act on behalf of passive objects; this is our main contribution in the present work. The other aspects of the Smart Interaction project and implimentation™s framework are only presented as far as necessary to understand the security aspect. This paper is organized as follows: In section 2, we start by shortly explaining the hard- and software environment the Smart Interaction project and implimentation is situated in, including our definition of (passive) objects. Section 3 then gives an overview of related work, while section 4 presents our approach to P2P privacy and security between powerful peers. An addition to this approach to securely integrate (passive) objects with powerful peers “ the main contribution “ is presented in section 5. After that, we give a short conclusion and an outlook on our planned future research in section
project report helper
Active In SP

Posts: 2,270
Joined: Sep 2010
20-09-2010, 04:26 PM

More Info About determinig attributes to maximize visibilty of objects

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: distinguish objects in digital image, securing network content smetters ppt, review of literature survey on securing wifi networks, securing mobile ad hoc networks with certificateless public keys pdf, seminar on securing underwater wireless communication networks ppt, securing bluetooth connection, development of agent based peer to peer mobile applications on android with jade ppt,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,221 16-07-2015, 09:21 PM
Last Post: Guest
  advantages and disadvantages of mobile phones in telugu jaseelati 0 198 07-02-2015, 02:21 PM
Last Post: jaseelati
  mobile phone based attendance tracking system ppt jaseelati 0 296 30-01-2015, 01:57 PM
Last Post: jaseelati
  mobile advantages and disadvantages in hindi wikipedia jaseelati 0 588 29-01-2015, 01:49 PM
Last Post: jaseelati
  mobile data internetworking standards jaseelati 0 302 29-01-2015, 01:15 PM
Last Post: jaseelati
  computational intelligence in wireless sensor networks ppt jaseelati 0 351 10-01-2015, 03:10 PM
Last Post: jaseelati
  difference between soc and aoc in mobile computing jaseelati 0 313 20-12-2014, 01:12 PM
Last Post: jaseelati
  online voting using bluetooth enabled mobile phone projec jaseelati 0 327 09-12-2014, 03:21 PM
Last Post: jaseelati
  online voting using bluetooth enabled mobile phone jaseelati 0 317 29-11-2014, 04:47 PM
Last Post: jaseelati
  MANETS: MOBILE ADHOC NETWORKS seminar projects crazy 2 1,963 11-06-2014, 09:44 AM
Last Post: seminar project topic