scispace - formally typeset
Open AccessJournal ArticleDOI

A spontaneous ad hoc network to share WWW access

TLDR
A secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web, developed with the main objective of improving the communication and integration between different study centers of low-resource communities.
Abstract
In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation

TL;DR: A secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/asymmetric scheme and the trust between users in order to exchange the initial data and the secret keys that will be used to encrypt the data is presented.
Journal ArticleDOI

Group-based protocol and mobility model for VANETs to offer internet access

TL;DR: This paper presents a group-based protocol and mobility model for vehicular ad hoc networks (VANETs) where each public transport vehicle forms a group of vehicles and each vehicle is moving inside the group and can leave and join any group at will, while all groups are moving.
Journal ArticleDOI

Spontaneous ad hoc mobile cloud computing network.

TL;DR: A trusted algorithm is developed that is able to manage the activity of the nodes when they join and leave the network and presents a good efficiency and network performance even by using high number of nodes.
Journal Article

Securing Wireless Sensor Networks with Public Key Techniques.

TL;DR: A body-protective article comprising matched portions of a rigid, non-shattering, high-impact resistant polymer, interiorly lined with an adherent high- impact absorbing elastomer, made up of such matched portions.

Spontaneous Wireless Ad Hoc Networking: A Review

Smita Karve
TL;DR: All work to be done on spontaneous network is studied and various security mechanisms to be provided, including secure self configured protocol, which uses a hybrid symmetric/asymmetric key encryption scheme for user authentication and to exchange data.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Proceedings ArticleDOI

Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers

TL;DR: The modifications address some of the previous objections to the use of Bellman-Ford, related to the poor looping properties of such algorithms in the face of broken links and the resulting time dependent nature of the interconnection topology describing the links between the Mobile hosts.
Journal ArticleDOI

Securing ad hoc networks

TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Book

DSR: the dynamic source routing protocol for multihop wireless ad hoc networks

TL;DR: The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes, and a summary of some of the simulation and testbed implementation results for the protocol is provided.
Journal ArticleDOI

Summary cache: a scalable wide-area web cache sharing protocol

TL;DR: This paper demonstrates the benefits of cache sharing, measures the overhead of the existing protocols, and proposes a new protocol called "summary cache", which reduces the number of intercache protocol messages, reduces the bandwidth consumption, and eliminates 30% to 95% of the protocol CPU overhead, all while maintaining almost the same cache hit ratios as ICP.
Related Papers (5)