[go: up one dir, main page]

Skip to main content

Decentralized Authentication for Opportunistic Communications in Disaster Situations

  • Conference paper
  • First Online:
Ubiquitous Computing and Ambient Intelligence (UCAmI 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10586))

Abstract

This work presents a new secure system for deploying opportunistic communications for emergency management after any disaster in which network infrastructures have become collapsed or unavailable. This proposal uses different wireless technologies such as Bluetooth Low Energy, Wi-Fi Direct and LTE Direct to enable device-to-device communications between users through their smartphones. In this way, the system allows the deployment of decentralized communications in fragmented scenarios, what is essential for disaster relief applications. The general procedure of the proposed system is based on the use of chat rooms with possibility of real-time streaming. Two different types of chat rooms are defined: public chat rooms with open access for all registered and authenticated users, and private chat rooms that can be used by different authorized groups of people. The permissions required to use different chat room are established thanks to the use of a decentralized authentication scheme based on public keys and certificate graphs, where different trust levels can be applied. The proposed scheme includes also a decision protocol to choose the most appropriate communication technology in every moment, and a power saving protocol that minimizes the impact of the system on the device’s battery consumption. The first results of field experiments made with a beta application developed for Android smartphones are promising.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. CRISYS: Critical response in security and safety emergencies. http://cordis.europa.eu/project/rcn/98623_en.pdf. Accessed 4 July

  2. RESCUECELL: Using Cell Phone Detection TEchnology to Save Lives. http://www.rescuecell.eu/. Accessed 4 July

  3. TRADR: Long-Term Human-Robot Teaming for Robot-Assisted Disaster Response. http://www.tradr-project.eu. Accessed 4 July

  4. Gandotra, P., Jha, R.K.: Device-to-device communication in cellular networks: a survey. J. Netw. Comput. Appl. 71, 99–117 (2016)

    Article  Google Scholar 

  5. Asadi, A., Wang, Q., Mancuso, V.: A survey on device-to-device communication in cellular networks. IEEE Commun. Surv. Tutorials 16(4), 1801–1819 (2014)

    Article  Google Scholar 

  6. Gomez, C., Oller, J., Paradells, J.: Overview and evaluation of bluetooth low energy: an emerging low-power wireless technology. Sensors 12(9), 11734–11753 (2012)

    Article  Google Scholar 

  7. Wi-Fi Direct, Wi-Fi Alliance. https://www.wi-fi.org/discover-wi-fi/wi-fi-direct. Accessed 4 July

  8. Balraj, S.: LTE Direct Overview. Qualcomm Research, San Diego (2015)

    Google Scholar 

  9. Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mob. Comput. 2(1), 52–64 (2003)

    Article  Google Scholar 

  10. Seedorf, J., Gill, B., Kutscher, D., Schiller, B., Kohlweyer, D.: Fully decentralised authentication scheme for ICN in disaster scenarios. In: ACM International Conference on Information-Centric Networking, pp. 191–192 (2014)

    Google Scholar 

  11. Alpify. http://www.safe365.com/. Accessed 4 July

  12. Santos-González, I., Rivero-García, A., Caballero-Gil, P., Hernández-Goya, C.: Alternative communication system for emergency situations. In: WEBIST, pp. 397–402 (2014)

    Google Scholar 

  13. Jang, H.C., Lien, Y.N., Tsai, T.C.: Rescue information system for earthquake disasters based on MANET emergency communication platform. In: ACM International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, pp. 623–627 (2009)

    Google Scholar 

  14. Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson Education India (2006)

    Google Scholar 

  15. Yi, S., Kravets, R.: Composite key management for ad hoc networks. MobiQuitous 4, 52–61 (2004)

    Google Scholar 

  16. Dahshan, H., Irvine, J.: A robust selforganized public key management for mobile ad hoc networks. Secur. Commun. Netw. 3(1), 16–30 (2010)

    Google Scholar 

  17. Qualcomm Technologies. LTE Direct Always-on Device-toDevice Proximal Discovery. https://www.qualcomm.com/media/documents/files/lte-direct-always-on-device-to-device-proximal-discovery.pdf. Accessed 4 July

  18. Yu, C.H., Tirkkonen, O., Doppler, K., Ribeiro, C.: Power optimization of device-to-device communication underlaying cellular communication. In: IEEE International Conference on Communications, pp. 1–5 (2009)

    Google Scholar 

Download references

Acknowledgements

This work has been partially supported by the grants TESIS2015010102, TESIS2015010106, IPT-2012-0585- 370000, RTC-2014-1648-8 y TEC2014-54110-R.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iván Santos-González .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Santos-González, I., Caballero-Gil, P., Molina-Gil, J., Rivero-García, A. (2017). Decentralized Authentication for Opportunistic Communications in Disaster Situations. In: Ochoa, S., Singh, P., Bravo, J. (eds) Ubiquitous Computing and Ambient Intelligence. UCAmI 2017. Lecture Notes in Computer Science(), vol 10586. Springer, Cham. https://doi.org/10.1007/978-3-319-67585-5_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67585-5_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67584-8

  • Online ISBN: 978-3-319-67585-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics