Research Article

A Spontaneous Wireless Ad Hoc Trusted Neighbor Network Creation Protocol

Table 1

Qualitative comparison of related work protocols and our proposal.

[16][17][18][19][20][21][22][13][23]Proposal

IoTsYesNoNoNoNoNoNoNoNoNo
Cloud networkNoYesNoNoNoNoNoNoNoNo
Call to network goes to a web server connected to IP cloudYesNoNoNoNoNoNoNoNoNo
Mobile networkNoYesNoYesYesYesYesYesYesNo
Spontaneous wireless ad hoc networksYesYesYesYesYesYesYesYesYesYes
Create networkYesYesYesYesYesYesYesYesYesYes
Manages networkYesYesYesYesYesYesYesYesNoNo
Create resourcesNoYesNoYesYesYesYesYesYesNo
Share secure dataNoNoNoYesYesNoYesYesYesNo
Share services and resourcesNoYesNoYesYesYesYesYesYesNo
Offer secure servicesNoYesNoYesYesYesYesYesYesNo
Developed prototypeYesYesJava (J2ME) with KVMNoNoNoNoNoNoNo
Real deploymentNoNoMobile Nokia E65NoNoNoNoNoNoNo
Devices with limited resourcesYesNoYesYesYesNoYesYesYesYes
Heterogeneous systems (different devices)YesNoYesNoYesYesYesYesYesYes
Communities with low resourcesYesNoNoNoNoNoNoNoNoNo
Device with unique identityYesYesYesYesYesYesYesYesYesYes
Community with unique group identityYesNoNoNoNoNoNoNoNoNo
SimulationCastalia/OPNETCastaliaYesNoNoNoNoNoNoCastalia
Neighbor discovery phaseYesYesNoNoNoNoNoNoNoNo
Neighbor thresholdYesYesNoNoNoNoNoNoNoNo
Neighbor card listYesYesYesYesYesYesNoNoNoYes
Identity cardYesYesYesYesYesYesYesYesYesYes
Public-private key pairYesYesYesYesYesYesYesYesYesYes
Certificate signed by private keyYesYesYesYesYesYesYesYesYesNo
Identity card exchangeYesYesYesYesYesYesYesYesYesYes
Summary function hashYesSha-1Sha-1YesYesSHA-1SHA-1SHA-1SHA-1No
Local repository of public key certificates and trust valuesNoYesYesNoNoYesNoNoNoYes
Minimal user interaction (user-friendly application)YesYesYesYesYesYesYesYesYesYes
Users not expertsYesYesYesYesYesYesYesYesYesYes
Authentication phaseNoNoNoYesYesYesYesYesNoYes
Preauthentication phaseYesNoNoNoNoNoNoNoNoNo
Trust established by a userYesYesYesYesYesYesYesYesYesNo
Trust established automaticallyYesNoNoNoNoNoYesYesYesYes
Preauthentication user decides trust levelYesNoNoNoNoNoNoNoNoNo
Trust chainYesYesYesYesYesYesYesYesYesYes
Ranges of trustYesNoNoNoNoNoNoNoNoNo
Only two trust levelsNoYesYesYesYesYesYesYesYesYes
Changing trust valuesYesNoYesNoYesYesYesNoNoNo
Trust modifiable based on behaviorYesNoYesNoYesYesYesNoNoNo
Can also stop trustingNoNoNoNoNoYesYesYesNoNo
Public keys obtained through network of trustYesYesYesYesYesYesYesYesYesYes
Distributed administration service through trusted networkYesYesYesYesYesYesYesYesYesYes
Public key infrastructureYesYesYesYesYesYesYesYesYesYes
Each node acts as client/serverYesYesYesNoNoYesNoYesNoNo
Nodes join and leave network at will at any timeYesYesYesYesYesYesYesYesYesNo
First node creates and sets up the networkNoNoYesNoYesNoYesYesYesNo
Internet access to all nodesYesYesNoNoYesYesNoNoNoNo
Share many Internet servicesNoYesNoNoYesNoNoNoNoNo
Collaborate within Intranet/InternetYesYesNoNoYesYesNoNoNoNo
Distributed networksYesYesYesYesYesYesYesYesYesYes
Central administrationNoNoNoNoNoNoNoNoNoNo
Independent networksNoNoNoNoYesYesYesYesYesYes
Self-configured networkNoNoYesYesYesYesYesNoYesYes
Trust value based on human relationsYesYesYesYesYesYesYesYesYesYes
Devices similar behavior to human relationshipsYesYesYesYesYesYesYesYesYesYes
Predistribution key algorithmNoNoNoYesNoNoNoNoNoNo
Symmetric key encryptionNoAESAESAESYesAESYesAESAESNo
Asymmetric key encryptionNoRSA/ECCRSA/ECCYesYesRSA/ECCYesRSARSA/ECCNo
Cryptography suitable for low-power devicesNoNoNoNoNoYesYesYesYesNo
Session keyNoYesYesNoYesYesYesYesYesNo
Distributed CA (each node CA)YesYesYesYesYesYesYesYesYesYes
Distributed name serviceNoNoNoNoNoYesNoNoNoNo
The CA for a node any of the trusted nodesYESYesYesYesYesYesYesYesYesYes
Trust relationship can be asymmetricNoNoNoNoNoYesYesYesNoNo
Trust based on physical proximity (first visual contact)YesNoYesYesYesYesYesYesYesNo
Unique IP address assignmentYesYesYesYesYesYesYesYesYesNo
Detect existence of duplicated IP addressesYesNoYesYesNoYesNoYesYesNo
Addresses obtained dynamicallyNoYesNoNoNoNoYesYesYesNo
Authenticate using IP addressesNoNoYesNoNoNoNoYesYesNo
Authentication exchanging keysNoNoNoYesNoYesYesYesYesYes
Authorization exchanging keysNoNoNoYesNoYesYesYesYesNo
Key managementYesYesYesYesYesYesYesYesYesYes
Initial exchange of data/keysNoNoNoYesYesYesYesYesYesYes
Exchange secret keys to encrypt dataNoNoNoYesYesYesYesYesYesNo
Each node requests services from its trusted nodesNoNoNoYesNoYesYesNoYesNo
Groups work in a collaborative way for the network maintenanceYesNoNoNoNoYesYesYesYesNo
Just one node is required to be connected to the InternetYesYesNoNoYesYesNoNoNoNo
More than one node can be connected to provide Internet accessYesNoNoNoYesYesNoNoNoNo
Connection shared if one user has Internet connectionYesYesNoNoYesYesNoNoNoNo
Access to the WWW if one user has Internet connectionYesNoNoNoYesYesNoNoNoNo
Best nodes carry out communications through the InternetYesNoNoNoYesYesNoNoNoNo
Services shared using TCP connectionsNoNoYesNoNoNoNoNoNoNo
TCP/IP protocolsYesNoNoNoNoNoNoNoNoNo
Network built using IEEE 802.11b/gNoNoYesNoNoNoNoYesYesNo
Authentication through Bluetooth or ZigBeeNoNoYesYesNoNoYesYesYesYes
Based on social networksYesNoNoNoNoNoNoNoNoYes
Intrusion detection techniqueNoNoNoYesYesNoNoYesNoNo
Caching technique to avoid overload of the nodesNoNoNoNoYesNoNoNoNoNo