Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2016, Article ID 3136853, 18 pages
http://dx.doi.org/10.1155/2016/3136853
Research Article

SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networks

1Department of Informatics, Federal University of Parana (UFPR), 81531970 Curitiba, Brazil
2Department of Informatics, Catarinense Federal Institute (IFC), 89245000 Araquari, Brazil

Received 28 December 2015; Revised 18 April 2016; Accepted 26 April 2016

Academic Editor: Tzonelih Hwang

Copyright © 2016 Eduardo da Silva and Luiz Carlos Pessoa Albini. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. Wu, J. Chen, J. Wu, and M. Cardei, “A survey of attacks and countermeasures in mobile ad hoc networks,” in Wireless Network Security, Y. Xiao, X. S. Shen, and D.-Z. Du, Eds., Signals and Communication Technology, chapter 12, pp. 103–135, Springer, New York, NY, USA, 2007. View at Publisher · View at Google Scholar
  2. P. Papadimitratos and Z. J. Haas, “Securing mobile ad hoc networks,” in The Handbook of Ad Hoc Wireless Networks, chapter 21, pp. 457–481, CRC Press, Boca Raton, Fla, USA, 2005. View at Google Scholar
  3. R. Shirey, RFC 2828: Internet Security Glossary, EUA, Marina del Rey, Calif, USA, 2000, http://www.ietf.org/rfc/rfc2828.txt.
  4. E. da Silva and L. C. P. Albini, “Middleware proposals for mobile ad hoc networks,” Journal of Network and Computer Applications, vol. 43, pp. 103–120, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. P. A. Bernstein, “Middleware: a model for distributed system services,” Communications of the ACM, vol. 39, no. 2, pp. 86–98, 1996. View at Publisher · View at Google Scholar
  6. J. Al-Jaroodi, I. Jawhar, A. Al-Dhaheri, F. Al-Abdouli, and N. Mohamed, “Security middleware approaches and issues for ubiquitous applications,” Computers and Mathematics with Applications, vol. 60, no. 2, pp. 187–197, 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. S. Hadim, J. Al-Jaroodi, and N. Mohamed, “Trends in middleware for mobile ad hoc networks,” Journal of Communications, vol. 1, no. 4, pp. 11–21, 2006. View at Google Scholar · View at Scopus
  8. I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc networking: imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, 2003. View at Publisher · View at Google Scholar · View at Scopus
  9. E. da Silva, A. L. dos Santos, L. C. P. Albini, and M. N. Lima, “Identity-based key management in mobile ad hoc networks: techniques and applications,” IEEE Wireless Communications, vol. 15, no. 5, pp. 46–52, 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. H.-Y. Chien and R.-Y. Lin, “Improved ID-based security framework for ad hoc network,” Ad Hoc Networks, vol. 6, no. 1, pp. 47–60, 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology—CRYPTO 2001, J. Kilian, Ed., vol. 2139 of Lecture Notes in Computer Science, pp. 213–229, Springer, London, UK, 2001. View at Publisher · View at Google Scholar
  12. X. Li, J. Slay, and S. Yu, “Evaluating trust in mobile ad hoc networks,” in Proceedings of the Workshop of International Conference on Computational Intelligence and Security (CIS '05), Springer, Xi'an, China, 2005.
  13. J. van der Merwe, D. Dawoud, and S. McDonald, “A survey on peer-to-peer key management for mobile ad hoc networks,” ACM Computing Surveys, vol. 39, no. 1, article 1, Article ID 1216371, 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. M. Nogueira, G. Pujolle, E. Silva, A. Santos, and L. Albini, “Survivable keying for wireless ad hoc networks,” in Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM '09), pp. 606–613, IEEE Communications Society, Long Island, NY, USA, June 2009. View at Publisher · View at Google Scholar
  15. M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized trust management,” in Proceedings of the 17th IEEE Symposium on Security and Privacy (SP '96), pp. 164–173, Oakland, Calif, USA, May 1996. View at Scopus
  16. M. Misaghi, E. da Silva, and L. C. P. Albini, “Distributed self-organized trust management for mobile ad hoc networks,” in Networked Digital Technologies, R. Benlamri, Ed., vol. 293 of Communications in Computer and Information Science, pp. 506–518, Springer, 2012. View at Publisher · View at Google Scholar
  17. E. da Silva, M. Misaghi, and C. P. Luiz, “True: a trust evaluation service for mobile ad hoc networks resistant to malicious attacks,” Journal of Digital Information Management, vol. 10, no. 4, pp. 262–271, 2012. View at Google Scholar
  18. J. W. Mickens and B. D. Noble, “Modeling epidemic spreading in mobile environments,” in Proceedings of the 4th ACM Workshop on Wireless Security (WiSe '05), pp. 77–86, ACM, Cologne, Germany, September 2005. View at Publisher · View at Google Scholar
  19. X. Zhang, G. Neglia, J. Kurose, and D. Towsley, “Performance modeling of epidemic routing,” Computer Networks, vol. 51, no. 10, pp. 2867–2891, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  20. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology, G. R. Blakley and D. Chaum, Eds., vol. 196 of Lecture Notes in Computer Science, pp. 47–53, Springer, New York, NY, USA, 1985. View at Publisher · View at Google Scholar
  21. A. Kate and I. Goldberg, “Distributed private-key generators for identity-based cryptography,” in Security and Cryptography for Networks, J. A. Garay and R. De Prisco, Eds., vol. 6280 of Lecture Notes in Computer Science, pp. 436–453, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar
  22. E. da Silva and L. C. P. Albini, “Towards a fully self-organized identity-based key management system for MANETs,” in Proceedings of the 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob '13), pp. 717–723, Lyon, France, October 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Securing mobile ad hoc networks with certificateless public keys,” IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 386–399, 2006. View at Publisher · View at Google Scholar
  24. H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, “URSA: ubiquitous and robust access control for mobile ad hoc networks,” IEEE/ACM Transactions on Networking, vol. 12, no. 6, pp. 1049–1063, 2004. View at Publisher · View at Google Scholar · View at Scopus
  25. L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, vol. 13, no. 6, pp. 24–30, 1999. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for mobile ad-hoc networks,” in Proceedings of the International Conference on Network Protocols (ICNP '01), pp. 251–260, Washington, DC, USA, November 2001. View at Scopus
  27. S. Yi and R. Kravets, “MOCA: mobile certificate authority for wireless ad hoc networks,” in Proceedings of the 2nd Annual PKI Research Workshop (PKI '03), National Institute of Standards and Technology (NIST), Gaithersburg, Md, USA, 2003.
  28. K. Hoeper and G. Gong, “Key revocation for identity-based schemes in mobile ad hoc networks,” in Ad-Hoc, Mobile, and Wireless Networks, T. Kunz and S. S. Ravi, Eds., vol. 4104 of Lecture Notes in Computer Science, pp. 224–237, Springer, 2006. View at Publisher · View at Google Scholar
  29. V. Daza, P. Morillo, and C. Ràfols, “On dynamic distribution of private keys over MANETs,” Electronic Notes in Theoretical Computer Science, vol. 171, no. 1, pp. 33–41, 2007. View at Publisher · View at Google Scholar · View at Scopus
  30. O. Courand, O. Droegehorn, K. David et al., “Context aware group management in mobile environments,” in Proceedings of the 14th IST Mobile and Wireless Communications Summit, Nokia Research Center, Dresden, Germany, 2005.
  31. C. N. Ververidis and G. C. Polyzos, “Service discovery for mobile ad hoc networks: a survey of issues and techniques,” IEEE Communications Surveys & Tutorials, vol. 10, no. 3, pp. 30–45, 2008. View at Publisher · View at Google Scholar · View at Scopus
  32. J. Hur, C. Park, and S. O. Hwang, “Privacy-preserving identity-based broadcast encryption,” Information Fusion, vol. 13, no. 4, pp. 296–303, 2012. View at Publisher · View at Google Scholar · View at Scopus
  33. D. Augot, R. Bhaskar, V. Issarny, and D. Sacchetti, “An efficient group key agreement protocol for ad hoc networks,” in Proceedings of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM '05), pp. 576–580, Washington, DC, USA, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  34. B. E. Jung, “An efficient group key agreement protocol,” IEEE Communications Letters, vol. 10, no. 2, pp. 106–107, 2006. View at Publisher · View at Google Scholar · View at Scopus
  35. L. Zhang, Q. Wu, B. Qin, and J. Domingo-Ferrer, “Provably secure one-round identity-based authenticated asymmetric group key agreement protocol,” Information Sciences, vol. 181, no. 19, pp. 4318–4329, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus