CONCEPT: A Service Framework for Secure Ad-Hoc Environments

Despite its obvious potential in many contexts, ad-hoc networks are still mostly unknown, not popular and not a clear choice in the absence of any other network infrastructure. Two main reasons may be pointed out: the difficulty to configure a secure ad-hoc environment and the lack of ease to use services targeted to such environments.

[1]  Rajive Bagrodia,et al.  Programming in mobile ad hoc networks , 2008, WICON 2008.

[2]  Jie Wu,et al.  Quorum Based IP Address Autoconfiguration in Mobile Ad Hoc Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[3]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[4]  Sung-Gi Min,et al.  Analysis of Critical Points for IP Address Auto-Configuration in Ad-Hoc Networks , 2010, 2010 Ninth International Conference on Networks.

[5]  Ravi Prakash,et al.  MANETconf: configuration of hosts in a mobile ad hoc network , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[6]  Paolo Bellavista,et al.  REDMAN: a decentralized middleware solution for cooperative replication in dense MANETs , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[7]  Stefano Ceri,et al.  Model-driven development of context-aware Web applications , 2007, TOIT.

[8]  Johann van der Merwe,et al.  Fully self-organized peer-to-peer key management for mobile ad hoc networks , 2005, WiSe '05.

[9]  Christian F. Tschudin,et al.  Dynamic names and private address maps: complete self-configuration for MANETs , 2006, CoNEXT '06.

[10]  Suhaidi Hassan,et al.  Loss Detection and Recovery Techniques for TCP in Mobile Ad Hoc Network , 2010, 2010 Second International Conference on Network Applications, Protocols and Services.

[11]  Harish Kumar,et al.  Issues & Trends in AutoConfiguration of IP Address in MANET , 2008 .

[12]  J. Gnana Jayanthi,et al.  IPv6 MANET: An Essential Technology for Future Pervasive Computing , 2010, 2010 Second International Conference on Communication Software and Networks.

[13]  Thomas Narten,et al.  IPv6 Stateless Address Autoconfiguration , 1996, RFC.

[14]  E. Guttman,et al.  Autoconfiguration for IP networking: enabling local communication , 2001 .

[15]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[16]  T.R. Henderson,et al.  CORE: A real-time network emulator , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[17]  Paz Morillo,et al.  On Dynamic Distribution of Private Keys over MANETs , 2007, Electron. Notes Theor. Comput. Sci..

[18]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[19]  Abdelsalam Helal,et al.  Konark - a service discovery and delivery protocol for ad-hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[20]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[21]  Paolo Bellavista,et al.  The real Ad-hoc Multi-hop Peer-to-peer (RAMP) middleware: An easy-to-use support for spontaneous networking , 2010, The IEEE symposium on Computers and Communications.

[22]  Sanghyun Ahn,et al.  A modified centralized DNS approach for the dynamic MANET environment , 2009, 2009 9th International Symposium on Communications and Information Technology.

[23]  Girish Katkar,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.