Cart (Loading....) | Create Account
Close category search window
 

Platform and experimentation of secure service location with P2P/Client-Server over ad hoc networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Botero, O. ; CNRS SAMOVAR Lab., Telecom Sud Paris, Evry, France ; Chaouchi, H.

Ad hoc networking is considered as an inexpensive solution for easy and fast wireless network coverage. However, for real service deployment, security and availability in such networks are still under research even though some experimentation has shown its viability. Additionally, peer-to-peer (P2P) networking has emerged as a key technology to enable resource sharing among users. As a result, the load charge on servers can be reduced by using P2P, but this approach presents a drawback related to the services availability; when a peer is not connected, its resources are not reachable. Alternatively, Client-Server architecture provides a centralized approach; but a high demand on client requests might deteriorate service response and capacity. In the case of ad hoc networks, offering services securely is even more challenging since all nodes are anonymous until being authenticated. In this paper, we propose to offer a secure location of services in an ad hoc environment. We focused on the development of a proxy-based solution to combine a P2P-client/server network overlay in order to provide securely the location information of network services (e.g. AAA service, Kerberos) and to set a platform that can include application services (e.g. multimedia content service). More precisely, we deployed a network overlay P2P platform using JXTA; a set of peer to peer protocols, and we developed simple peer nodes and a proxy server for providing and ensuring service access control. Other security services can also be deployed such as Kerberos, PKI, among others. In our platform, the JXTA was combined; through the proxy server, with a distributed Radius AAA server to perform authentication tasks prior to discovering the location of the required services in the ad hoc network. We added encryption and message authentication code mechanisms to provide a complete secured solution. GPS Bluetooth devices were used to obtain nodes location but other location systems are also possible. - - Finally, a detailed description of the system architecture and platform is provided describing all the modular components as well as numerical results derived from a simple test bed.

Published in:

Wireless Days (WD), 2009 2nd IFIP

Date of Conference:

15-17 Dec. 2009

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.