13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A New Framework for Build<strong>in</strong>g Secure CollaborativeSystems <strong>in</strong> True Ad Hoc NetworkHans-Peter Bischof, Alan Kam<strong>in</strong>sky, and Joseph B<strong>in</strong>derRochester Institute of Technology, 102Lomb Mermorial Dr, Rochester, NY 14623{hpb,ark,jsb7834}@cs.rit.eduAbstract. Many-to-Many Invocation (M2MI) is a new paradigm for build<strong>in</strong>gsecure collaborative systems that run <strong>in</strong> true ad hoc networks of fixed and mobilecomput<strong>in</strong>g devices. M2MI is useful for build<strong>in</strong>g a broad range of systems,<strong>in</strong>clud<strong>in</strong>g service discovery frameworks; groupware for mobile ad hoc collaboration;systems <strong>in</strong>volv<strong>in</strong>g networked devices (pr<strong>in</strong>ters, cameras, sensors); andcollaborative middleware systems. M2MI provides an object oriented methodcall abstraction based on broadcast<strong>in</strong>g. An M2MI <strong>in</strong>vocation means “every objectout there that implements this <strong>in</strong>terface, call this method.” M2MI is layeredon top of a new messag<strong>in</strong>g protocol, the Many-to-Many Protocol (M2MP),which broadcasts messages to all near<strong>by</strong> devices us<strong>in</strong>g the wireless network's<strong>in</strong>herent broadcast nature <strong>in</strong>stead of rout<strong>in</strong>g messages from device to device. Inan M2MI-based system, central servers are not required; network adm<strong>in</strong>istrationis not required; complicated, resource-consum<strong>in</strong>g ad hoc rout<strong>in</strong>g protocolsare not required; and system development and deployment are simplified.Keywords: Collaborative systems, peer-to-peer systems, distributed objects,decentralized key management, ad hoc network<strong>in</strong>g, server-less network<strong>in</strong>g.IntroductionThis paper describes a new paradigm, Many-to-Many Invocation (M2MI), for build<strong>in</strong>gsecure collaborative systems that run <strong>in</strong> true ad hoc networks of fixed and mobilecomput<strong>in</strong>g devices. M2MI is useful for build<strong>in</strong>g a broad range of systems, <strong>in</strong>clud<strong>in</strong>gservice discovery frameworks; groupware for mobile ad hoc collaboration.We also address encryption and decryption of M2MI method <strong>in</strong>vocations and a describea decentralized key management <strong>in</strong> ad hoc networks.M2MI provides an object oriented method call abstraction based on broadcast<strong>in</strong>g.An M2MI-based application broadcasts method <strong>in</strong>vocations, which are received andperformed <strong>by</strong> many objects <strong>in</strong> many target devices simultaneously. An M2MI <strong>in</strong>vocationmeans “Everyone out there that implements this <strong>in</strong>terface, call this method.” Thecall<strong>in</strong>g application does not need to know the identities of the target devices ahead oftime, does not need to explicitly discover the target devices, and does not need to setup <strong>in</strong>dividual connections to the target devices. The call<strong>in</strong>g device simply broadcastsmethod <strong>in</strong>vocations, and all objects <strong>in</strong> the proximal network that implement thosemethods will execute them.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 164–174, 2003.© Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!