Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks
#1

[attachment=1758]

Abstract

Security and privacy in mobile ad-hoc peer-to-peer environments are hard to attain, especially when working with passive objects without own processing power. We introduce a method for integrating such objects into a peer-to-peer environment without infrastructure components while providing a high level of privacy and security for peers interacting with objects. The integration is done by equipping passive objects with public keys, which can be used by peers to validate proxies acting on behalf of the objects. To overcome the problem of limited storage capacity on small embedded objects, ECC keys are used.

1 Introduction Currently, ad-hoc networks is a highly active research topic with many publications covering different aspects of this inter-disciplinary field (e.g. [15]). These aspects include, but are certainly not limited to, hardware (e.g. size, rugged design, power consumption, communication), software (e.g. operating system/platform, communication protocols, memory usage), interaction (e.g. interaction models, HCI aspects), security and application issues. In this paper, we will focus on privacy and security aspects of ad-hoc, peer-to-peer networks within the Smart Interaction project. The Smart Interaction project is an approach to interact with persons, things and places in a natural and non-obtrusive way. As for example people meet each other, their interaction profile is mutually compared in analogy to their natural, automatic choice of sympathy. Following the vastly successful way of human communication and coordination, the Peer-to-Peer (P2P) paradigm is used for direct communication among all participating devices. This offers complete device autonomy, independence of central authorities and reliability due to redundancy. Within the Smart Interaction project, this principle is even taken one step further by also being independent of any common communication infrastructure: we utilize solely ad-hoc wireless networks, currently either IEEE802.11b Wireless LAN (WLAN) or IEEE802.15.1 Bluetooth (BT). To match the flexibility of the P2P approach, local profiles describing the device capabilities, user attributes and preferences are kept on every peer. Upon spatial contact with other peers, these profiles provide the base for matching user interests and determining further, automatic coordination. Additionally, context constraints defined in profiles provide the necessary context awareness for ubiquitous applications; different situations, identified by context parameters, demand different behavior. As in any ubiquitous system, privacy and security are major concerns and are taken seriously by utilizing active and passive privacy control backed by strong cryptography. We do not aim to develop new cryptographic algorithms or novel security protocols, but instead utilize and combine well-known and secure techniques. However, we were unable to find protocols or methods for securely integrating passive objects without own processing capabilities into a P2P infrastructure. As this is an issue in our project, we developed a method to secure remote proxies that act on behalf of passive objects; this is our main contribution in the present work. The other aspects of the Smart Interaction project™s framework are only presented as far as necessary to understand the security aspect. This paper is organized as follows: In section 2, we start by shortly explaining the hard- and software environment the Smart Interaction project is situated in, including our definition of (passive) objects. Section 3 then gives an overview of related work, while section 4 presents our approach to P2P privacy and security between powerful peers. An addition to this approach to securely integrate (passive) objects with powerful peers “ the main contribution “ is presented in section 5. After that, we give a short conclusion and an outlook on our planned future research in section
Reply
#2

More Info About determinig attributes to maximize visibilty of objects


http://studentbank.in/report-hvdc-transm...0#pid14770
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: dictionary objects c, peer to peer networks definition, live distributed objects enabling the active web, zope enterprise objects, securing the internet system, portable objects proved, ad hoc mobile networks,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 42,966 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 30,912 07-10-2016, 09:02 AM
Last Post: ijasti
  broadband mobile full report project topics 7 23,936 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 2,834 14-07-2015, 02:24 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,166 01-05-2015, 03:36 PM
Last Post: seminar report asees
  Mobile Train Radio Communication Electrical Fan 5 14,760 11-03-2015, 07:27 PM
Last Post: Guest
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,584 26-02-2015, 08:03 PM
Last Post: Guest
  Shallow Water Acoustic Networks (SWANs project report helper 2 1,864 24-03-2014, 10:10 PM
Last Post: seminar report asees
  Bluetooth Based Smart Sensor Networks (Download Full Seminar Report) Computer Science Clay 75 53,887 16-02-2013, 10:16 AM
Last Post: seminar details
  FACE RECOGNITION USING NEURAL NETWORKS (Download Seminar Report) Computer Science Clay 70 32,263 01-02-2013, 09:28 PM
Last Post: Guest

Forum Jump: