Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 232419, 19 pages
http://dx.doi.org/10.1155/2014/232419
Research Article

Spontaneous Ad Hoc Mobile Cloud Computing Network

1Universidad San Jorge, A-23, km 299, Villanueva de Gállego, 50830 Zaragoza, Spain
2Universidad Politécnica de Valencia, Camino Vera S/N, 46022 Valencia, Spain

Received 28 April 2014; Accepted 10 July 2014; Published 17 August 2014

Academic Editor: Zhongmei Zhou

Copyright © 2014 Raquel Lacuesta et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Preu and C. H. Cap, “Overview of spontaneous networking—evolving concepts and technologies,” in Proceeding of the Workshop on Future Services for Networked Devices (FuSeNetD '99), Heidelberg, Germany, 1999.
  2. O. Bello, A. Bagula, and H. A. Chan, “Automatic network service discovery and selection in virtualization-based future internet,” Network Protocols and Algorithms, vol. 4, no. 2, pp. 5–29, 2012. View at Google Scholar
  3. S. Gallo, L. Galluccio, G. Morabito, and S. Palazzo, “Rapid and energy efficient neighbor discovery for spontaneous networks,” in Proceedings of the 7th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM '04), pp. 8–11, Venice, Italy, October 2004. View at Scopus
  4. J. J. P. C. Rodrigues, L. Zhou, L. D. P. Mendes, K. Lin, and J. Lloret, “Distributed media-aware flow scheduling in cloud computing environment,” Computer Communications, vol. 35, no. 15, pp. 1819–1827, 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. A. H. Mohsin, K. A. Bakar, A. Adekiigbe, and K. Z. Ghafoor, “A survey of energy-aware routing protocols in mobile Ad-hoc networks: trends and challenges,” Network Protocols and Algorithms, vol. 4, no. 2, pp. 82–107, 2012. View at Google Scholar
  6. L. M. Feeney, B. Ahlgren, and A. Westerlund, “Spontaneous networking: an application-oriented approach to ad hoc networking,” IEEE Communications Magazine, vol. 39, no. 6, pp. 176–181, 2001. View at Publisher · View at Google Scholar · View at Scopus
  7. K. Z. Ghafoor, K. A. Bakar, M. A. Mohammed, and J. Lloret, “Vehicular cloud computing: trends and challenges,” in Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications, pp. 262–274, IGI Global, 2013. View at Google Scholar
  8. H. Modares, J. Lloret, A. Moravejosharieh, and R. Salleh, “Security in mobile cloud computing,” in Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications, pp. 79–91, IGI Global, 2013. View at Google Scholar
  9. N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: a survey,” Future Generation Computer Systems, vol. 29, no. 1, pp. 84–106, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Lloret, L. Shu, R. Lacuesta, and M. Chen, “User-oriented and service-oriented spontaneous ad hoc and sensor wireless networks,” Ad-Hoc and Sensor Wireless Networks, vol. 14, no. 1-2, pp. 1–8, 2012. View at Google Scholar · View at Scopus
  11. A. K. Gupta, H. Sadawarti, and A. K. Verma, “Performance analysis of AODV, DSR & TORA routing protocols,” IACSIT International Journal of Engineering and Technology, vol. 2, no. 2, pp. 226–231, 2010. View at Google Scholar
  12. P. Bellavista, A. Corradi, and C. Giannelli, “The real ad-hoc multi-hop peer-to-peer (RAMP) middleware: an easy-to-use support for spontaneous networking,” in Proceedings of the 15th IEEE Symposium on Computers and Communications (ISCC '10), pp. 463–470, Riccione, Italy, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. J. H. Christensen, “Using RESTful web-services and cloud computing to create next generation mobile applications,” in Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications, pp. 627–633, ACM, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. M. Mani, A. Nguyen, and N. Crespi, “SCOPE: a prototype for spontaneous P2P social networking,” in Proceedings of the 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops '10), pp. 220–225, Mannheim, Germany, March-April 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. L. Liu, J. Xu, N. Antonopoulos, J. Li, and K. Wu, “Adaptive service discovery on service-oriented and spontaneous sensor systems,” Ad-Hoc and Sensor Wireless Networks, vol. 14, no. 1-2, pp. 107–132, 2012. View at Google Scholar · View at Scopus
  16. G. Kirby, A. Dearle, A. Macdonald, and A. Fernandes, “An approach to ad hoc cloud computing,” http://arxiv.org/abs/1002.4738.
  17. G. Huerta-Canepa and D. Lee, “A virtual cloud computing provider for mobile devices,” in Proceedings of the 1st ACM Workshop on Mobile Cloud Computing and Services: Social Networks and Beyond (MCS '10), June 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. V. L. Divya, “Mobile application with cloud computing,” International Journal of Scientific and Research Publications, vol. 2, no. 4, 2012. View at Google Scholar
  19. R. Lacuesta, J. Lloret, M. Garcia, and L. Peñalver, “A secure protocol for spontaneous wireless Ad Hoc networks creation,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 4, pp. 629–641, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. R. Lacuesta, J. Lloret, M. Garcia, and L. Peñalver, “Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks,” Journal of Network and Computer Applications, vol. 34, no. 2, pp. 492–505, 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. J. Lloret, R. Lacuesta, M. Garcia, and L. Pealver, “A spontaneous ad hoc network to share www access,” Eurasip Journal on Wireless Communications and Networking, vol. 2010, Article ID 232083, 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. R. Lacuesta, G. Palacios-Navarro, C. Cetina, L. Peñalver, and J. Lloret, “Internet of things: where to be is to trust,” Eurasip Journal on Wireless Communications and Networking, vol. 2012, article 203, 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. R. Lacuesta and L. Peñalver, “Automatic configuration of ad-hoc networks: establishing unique IP link-local addresses,” in Proceedings of the International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '07), Valencia, Spain, October 2007.
  24. F. Schatz, S. Koschnicke, N. Paulsen, and M. Schimmler, “Master/Slave assignment optimization for high performance computing in an EC2 cloud using MPI,” Network Protocols and Algorithms, vol. 4, no. 1, pp. 22–33, 2012. View at Google Scholar
  25. S. Capkun, L. Buttyán, and J.-P. Hubaux, “Self-organized public-key management for mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52–64, 2003. View at Publisher · View at Google Scholar · View at Scopus
  26. T. Czachorski and F. Pekergin, “Diffusion approximation as a modeling tool in congestion control and performance evaluation,” in Proceedings of the 2nd International Working Conference Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs '04), West Yorkshire, UK, July 2004.
  27. A. S. Wandert, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, “Energy analysis of public-key cryptography for wireless sensor networks,” in Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom '05), pp. 324–328, Kauai Island, Hawaii, USA, March 2005. View at Scopus
  28. N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, “Analyzing the energy consumption of security protocols,” in Proceedings of the International Symposium on Low Power Electronics and Design (ISLPED '03), Seoul, Republic of Korea, August 2003. View at Scopus
  29. J. Goodman and A. Chandrakasan, “An energy efficient reconfigurable public-key cryptography processor architecture,” in Cryptographic Hardware and Embedded Systems—CHES 2000, vol. 1965 of Lecture Notes in Computer Science, pp. 175–190, Springer, 2000. View at Google Scholar
  30. S. Landau, “Communications security for the twenty-first century: the advanced encryption standard,” Notices of the American Mathematical Society, vol. 47, no. 4, pp. 450–459, 2000. View at Google Scholar
  31. A. Kumar, A. Aggarwal, and C. Charu, “Performance analysis of MANET using elliptic curve cryptosystem,” in Proceedings of the 14th International Conference on Advanced Communication Technology (ICACT '12), pp. 201–206, February 2012.
  32. R. Mayrhofer, F. Ortner, A. Ferscha, and M. Hechinger, “Securing passive objects in mobile ad-hoc peer-to-peer networks,” Electronic Notes in Theoretical Computer Science, vol. 85, no. 3, pp. 105–121, 2003. View at Publisher · View at Google Scholar · View at Scopus
  33. FIPS 180-1-Secure Hash Standard, “SHA-1. National Institute of Standards and Technology,” http://www.itl.nist.gov/fipspubs/fip180-1.htm.
  34. J. Rumbaugh, I. Jacobson, and G. Booch, Unified Modeling Language Reference Manual, Addison-Wesley Professional, Boston, Mass, USA, 2nd edition.
  35. Castalia Website, http://castalia.research.nicta.com.au/index.php/en/.
  36. L. D. P. Mendes, J. J. P. C. Rodrigues, J. Lloret, and S. Sendra, “Cross-layer dynamic admission control for cloud-based multimedia sensor networks,” IEEE Systems Journal, vol. 8, no. 1, pp. 235–246, 2013. View at Publisher · View at Google Scholar · View at Scopus
  37. R. Dutta and B. Annappa, “Protection of data in unsecured public cloud environment with open, vulnerable networks using threshold-based secret sharing,” Network Protocols and Algorithms, vol. 6, no. 1, pp. 58–75, 2014. View at Google Scholar