Advertisement

Middleware Services for Information Sharing in Mobile Ad-Hoc Networks

Challenges and Approach
  • Thomas Plagemann
  • Jon Andersson
  • Ovidiu Drugan
  • Vera Goebel
  • Carsten Griwodz
  • Pål Halvorsen
  • Ellen Munthe-Kaas
  • Matija Puzar
  • Norun Sanderson
  • Katrine Stemland Skjelsvik
Conference paper
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 169)

Abstract

Information sharing is a mission critical key element in rescue and emergency operations. Mobile ad-hoc networks (MANETs) could provide a useful infrastructure to support information sharing, but appropriate applications are needed. To facilitate efficient application development for this type of infrastructure, middleware support is needed. In the Ad-Hoc InfoWare project, we are currently developing corresponding middleware services. In this paper, we discuss the application requirements that are imposed onto the middleware services, and we outline our technical approach to address the corresponding challenges. The architecture we propose comprises five main building blocks, namely knowledge management, a local and a distributed event notification service, resource management, and security and privacy management. We indicate design alternatives for these building blocks, identify open problems and relate our approach to the state-of-the-art.

Key words

Middleware services information sharing mobile ad-hoc networks knowledge management event notification resource management security 

References

  1. 1.
    Alves-Foss, J., An Efficient Secure Authenticated Group Key Exchange Algorithm for Large And Dynamic Groups, Proceedings of the 23rd National Information Systems Security Conference, pages 254–266, October 2000Google Scholar
  2. 2.
    Bresson, E., Chevassut, O., Pointcheval, D., Provably Authenticated Group Diffie-Hellman Key Exchange-The Dynamic Case (Extended Abstract), Advances in Cryptology-Proceedings of AsiaCrypt 2001, pages 290–309. LNCS, Vol. 2248, 2001MathSciNetGoogle Scholar
  3. 3.
    Caporuscio, M., Inverardi, P., Pelliccione, P., Formal analysis of clients mobility in the Siena publish/subscribe middleware, Technical report, Department of Computer Science, University of L'Aquila, October 2002Google Scholar
  4. 4.
    Chen, K., Shah, S.H., Nahrstedt, K., Cross-Layer Design for Data Accessibility in Mobile Ad hoc Networks, Journal of Wireless Personal Communications, Special Issue on Multimedia Network Protocols and Enabling Radio Technologies, Kluwer Academic Publishers, Vol. 21, 2002, pp. 49–75Google Scholar
  5. 5.
    Cugola, G., Di Nitto, T., and Fuggetta, A., The JEDI event-based infrastructure and its application to the development of the OPSS WFMS, IEEE Transactions on Software Engineering, 27(9), 2001Google Scholar
  6. 6.
    Di Pietro, R., Mancini, L., Jajodia, S., Efficient and Secure Keys Management for Wireless Mobile Communications, Proceedings of the second ACM international workshop on Principles of mobile computing, pages 66–73, ACM Press, 2002Google Scholar
  7. 7.
    Fiege, L., Zeidler, A., Gartner, F.C., Handurukande, S.B., Dealing with Uncertainty in Mobile Publish/Subscribe Middleware, Proceedings of 1st International Workshop on Middleware for Pervasive and Ad-hoc Computing, 2003, pp. 60–67Google Scholar
  8. 8.
    Fontijn, W., Boncz, P., Ambient DB:-P2P Data Management Middleware for Ambient Intelligence, accepted for publication in the PERWARE04 Workshop (co-located with PERCOM 2004)Google Scholar
  9. 9.
    Huang Y., Garcia-Molina H., Publish/subscribe in a mobile environment, Proceedings of the 2nd ACM International Workshop on Data Engineering for Wireless and Mobile Access (mobiDE01), Santa Barbara, CA, May 2001Google Scholar
  10. 10.
    Kärpijoki, V., Security in Ad Hoc Networks, Tik-110.501, Seminar on Network Security, HUT TML 2000Google Scholar
  11. 11.
    Li, B., Wang. K. H., Nonstop: Continuous multimedia streaming in wireless ad hoc networks with node mobility, IEEE Journal on Selected Areas in Communications, December 2003, 21(10), pp. 1627–1641.CrossRefGoogle Scholar
  12. 12.
    Meier, R., Cahill, V., STEAM: Event-Based Middleware for Wireless Ad Hoc Networks, Proceedings of the International Workshop on Distributed Event-Based Systems (ICDCS/DEBS'02), 2002, pp. 639–644Google Scholar
  13. 13.
    Montenegro, G., Castelluccia, C, Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses, NDSS'02, February 2002Google Scholar
  14. 14.
    Perich, F., Avancha, S., Chakraborty, D., Joshi, A., Yesha, Y., Profile Driven Data Management for Pervasive Environments, Proceedings 13th International Conference on Database and Expert Systems Applications (DEXA 2002), September 2002Google Scholar
  15. 15.
    Schwotzer, T., Geihs, K., Shark-a System for Management, Synchronization and Exchange of Knowledge in Mobile User Groups, Proceedings 2nd International Conference on Knowledge Management (I-KNOW '02), Graz, Austria, July 2002, pp. 149–156Google Scholar

Copyright information

© International Federation for Information Processing 2005

Authors and Affiliations

  • Thomas Plagemann
    • 1
  • Jon Andersson
    • 2
  • Ovidiu Drugan
    • 1
  • Vera Goebel
    • 1
  • Carsten Griwodz
    • 1
  • Pål Halvorsen
    • 1
  • Ellen Munthe-Kaas
    • 1
  • Matija Puzar
    • 1
  • Norun Sanderson
    • 1
  • Katrine Stemland Skjelsvik
    • 1
  1. 1.Department of InformaticsUniversity of OsloOsloNorway
  2. 2.Thales Communications ASOsloNorway

Personalised recommendations