Skip to main content

Multilevel and Secure Services in a Fleet of Mobile Phones: The Multilevel Secured Messaging Application (MuSMA)

  • Conference paper
Mobile Computing, Applications, and Services (MobiCASE 2012)

Abstract

The level of guarantees that can provide systems leveraging MANets cannot reach that of more traditional networks due to their highly dynamic nature. Real MANets (based on mobile phones in our case) operate in an environment without any infrastructure where the nodes are intermittently connected over short or long periods of time. Solving the traditional problems that are identification, security of communications, content delivery and localization, therefore requires specific approaches. In addition, the mobile phones that make the MANet, offer different communication technologies that must be efficiently exploited in multilevel perspective, from the shorter range wireless radio standards to the longer range ones. This multilevel perspective must also integrate issues related to user preferences, energy saving and limited financial means. In this paper, we first propose a preliminary model taking into account all the elements previously mentioned in the context of a mobile phone oriented MANet. Next, we focus on two aspects that are the secure exchange of profiles and the choice of the transmission technology. We then describe the mobile application that we have developed based on this model and the first performance analysis that we have conducted. Finally, we detail the remaining challenges that must be solved in this novel approach and that will constitute the next steps of the research described in this position paper.

This paper presents a Work-in-Progress.

This work is partly supported by the Smart Urban Spaces European project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chaumette, S.: Can highly dynamic mobile ad hoc networks and distributed MEMS share algorithmic foundations? In: Proceedings of the 2nd Workshop on Design, Control and Software Implementation for Distributed MEMS, Besancon, France (2012)

    Google Scholar 

  2. Smart urban spaces website (September 2010), http://www.smarturbanspaces.org

  3. Haselsteiner, E., Breitfuss, K.: Security in Near Field Communications (NFC). In: Proceedings of the Workshop on RFID Security (2006)

    Google Scholar 

  4. Wang, H.J.: Policy-enabled handoffs across heterogeneous wireless networks. In: Mobile Computing Systems and Applications, WMCSA, pp. 51–60 (1999)

    Google Scholar 

  5. Serrador, A., Correia, L.M.: Policies for a cost function for heterogeneous networks performance evaluation. In: Proceedings of the 18th Annual IEEE International Symp. on Personal, Indoor and Mobile Radio Commun., Athens, Greece (2007)

    Google Scholar 

  6. Trestian, R., Ormond, O., Muntean, G.-M.: Power-friendly access network selection strategy for heterogeneous wireless multimedia networks. In: 2010 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting BMSB, pp. 1–5 (2010)

    Google Scholar 

  7. Shen, W., Zeng, Q.-A.: Cost-function-based network selection strategy in integrated wireless and mobile networks. In: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, Washington, DC, vol. 02, pp. 314–319 (2007)

    Google Scholar 

  8. Zhang, W.: Handover decision using fuzzy MADM in heterogeneous networks. In: 2004 IEEE Wireless Communications and Networking Conference IEEE Cat No04TH8733, pp. 653–658 (2004)

    Google Scholar 

  9. Bari, F., Leung, V.C.M.: Automated network selection in a heterogeneous wireless network environment. IEEE Network, 34–40 (2007)

    Google Scholar 

  10. Ma, Y., Jamalipour, A.: A cooperative cache-based content delivery framework for intermittently connected mobile ad hoc networks. Trans. Wireless. Comm., 366–373 (2010)

    Google Scholar 

  11. Haillot, J., Guidec, F.: A protocol for content-based communication in disconnected mobile ad hoc networks. Mob. Inf. Syst., 123–154 (2010)

    Google Scholar 

  12. Lindgren, A., Doria, A., Schelén, O.: Probabilistic routing in intermittently connected networks. SIGMOBILE Mob. Comput. Commun. Rev., 19–20 (2003)

    Google Scholar 

  13. Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Efficient routing in intermittently connected mobile networks: the multiple-copy case. IEEE/ACM Trans. Netw., 77–90 (2008)

    Google Scholar 

  14. Madlmayr, G., Langer, J., Kantner, C., Scharinger, J.: NFC devices: Security and privacy. In: Proceedings of ARES (2008)

    Google Scholar 

  15. Alliance, W.: Wi-Fi certified Wi-Fi direct: Personal, portable Wi-Fi technology. WIFI Alliance. Tech. Rep. (October 2010)

    Google Scholar 

  16. Reveilhac, M., Pasquet, M.: Promising secure element alternatives for NFC technology. In: 1st International Workshop on NFC, Hagenberg, Austria (2009)

    Google Scholar 

  17. Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 35–49. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  18. Hancke, G.P.: Practical eavesdropping and skimming attacks on high-frequency RFID tokens. Journal of Computer Security 19(2), 259–288 (2011)

    Article  Google Scholar 

  19. N. Forum, Simple NDEF exchange protocol - SNEP 1.0, NFC Forum, Tech. Rep. (2011)

    Google Scholar 

  20. GSMA, A. Kearney, and W. Intelligence, “European mobile industry observatory”, GSM Association, Tech. Rep. (2011)

    Google Scholar 

  21. Pathak, A., Hu, Y.C., Zhang, M.: Where is the energy spent inside my app?: fine grained energy accounting on smartphones with eprof. In: Proceedings of the 7th ACM European Conference on Computer Systems, pp. 29–42. ACM, New York (2012)

    Google Scholar 

  22. Itea2 website (September 2010), http://www.itea2.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Chaumette, S., Ouoba, J. (2013). Multilevel and Secure Services in a Fleet of Mobile Phones: The Multilevel Secured Messaging Application (MuSMA). In: Uhler, D., Mehta, K., Wong, J.L. (eds) Mobile Computing, Applications, and Services. MobiCASE 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36632-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36632-1_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36631-4

  • Online ISBN: 978-3-642-36632-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics