Research Article
Multilevel and Secure Services in a Fleet of Mobile Phones: The Multilevel Secured Messaging Application (MuSMA)
@INPROCEEDINGS{10.1007/978-3-642-36632-1_10, author={Serge Chaumette and Jonathan Ouoba}, title={Multilevel and Secure Services in a Fleet of Mobile Phones: The Multilevel Secured Messaging Application (MuSMA)}, proceedings={Mobile Computing, Applications, and Services. 4th International Conference, MobiCASE 2012, Seattle, WA, USA, October 11-12, 2012. Revised Selected Papers}, proceedings_a={MOBICASE}, year={2013}, month={2}, keywords={MANet multilevel communication mobile phone security}, doi={10.1007/978-3-642-36632-1_10} }
- Serge Chaumette
Jonathan Ouoba
Year: 2013
Multilevel and Secure Services in a Fleet of Mobile Phones: The Multilevel Secured Messaging Application (MuSMA)
MOBICASE
Springer
DOI: 10.1007/978-3-642-36632-1_10
Abstract
The level of guarantees that can provide systems leveraging MANets cannot reach that of more traditional networks due to their highly dynamic nature. Real MANets (based on mobile phones in our case) operate in an environment without any infrastructure where the nodes are intermittently connected over short or long periods of time. Solving the traditional problems that are identification, security of communications, content delivery and localization, therefore requires specific approaches. In addition, the mobile phones that make the MANet, offer different communication technologies that must be efficiently exploited in multilevel perspective, from the shorter range wireless radio standards to the longer range ones. This multilevel perspective must also integrate issues related to user preferences, energy saving and limited financial means. In this paper, we first propose a preliminary model taking into account all the elements previously mentioned in the context of a mobile phone oriented MANet. Next, we focus on two aspects that are the secure exchange of profiles and the choice of the transmission technology. We then describe the mobile application that we have developed based on this model and the first performance analysis that we have conducted. Finally, we detail the remaining challenges that must be solved in this novel approach and that will constitute the next steps of the research described in this position paper.