Skip to main content
Log in

Research Issues in Ad-Hoc Distributed Personal Networking

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper discusses the research issues that need to be addressed in order to create a personal distributed environment where people interact with various companion, embedded, or invisible computers not only in their close vicinity but potentially anywhere. These systems are called personal networks (PNs). They constitute a category of distributed systems with very specific characteristics. They are configured in an ad hoc fashion, as the opportunity and the demand arise, to support personal applications. PNs consist of communicating clusters of personal digital devices, devices shared with other people and even infrastructure-based systems. At the heart of a PN is a core Personal Area Network (PAN), which is physically associated with the owner of the PN. Unlike the present PANs that have a geographically limited coverage, the Personal Operating Space, PNs have an unrestricted geographical span, and incorporate devices into the personal environment regardless of their geographic location. In order to do this they need the services of infrastructure-based networks and ad-hoc networks to extend their reach. A PN extends and complements the concept of pervasive computing. We show that PNs introduce new design challenges due to the heterogeneity of the involved technologies, the need for self-organization, the dynamics of the system composition, the application-driven nature, the co-operation with infrastructure-based networks, and the security hazards. We discuss the impact of these problems on network design, assess present and proposed solutions, and identify the research issues.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. K. Ducatel et al., “Scenarios for Ambient Intelligence in 2010”, IST Advisory Group (ISTAG), European Commission, Brussels, www.cordis.lu/ist/istag.htm, 2001.

  2. W. Mohr et al., (eds.), “The Book of Visions 2000 – Visions of the Wireless World”, Version 1.0, Wireless Strategic Initiative, www.wireless-world-research.org, November 2000.

  3. J. Zander et al., “Telecom Scenario's in 2010”, PCC, KTH, Sweden, 1999.

  4. ACM, “The Next 1000 Years”, Special Issue of Communications of the ACM, Vol. 44, No. 3, 2001.

  5. F. Daoud and S. Mohan, “Service Portability and Virtual Home Environments”, Guest editorial, IEEE Communications, Vol. 40, No. 1, pp. 76–77, 2002.

    Article  Google Scholar 

  6. S.K. Gupta, W.-C. Lee, A. Purakayastha and P.K. Srimani, “An Overview of Pervasive Computing”, Guest editorial, IEEE Personal Communications, Vol. 8, No. 4, pp. 8–9, 2001.

    Article  Google Scholar 

  7. Bluetooth, http://www.bluetooth.com/

  8. IrDA Standard, http://www.irda.org/

  9. C. Bisdikian, P. Bhagwat and N. Golmie, “Wireless Personal Area Networks”, Guest Editorial, IEEE Network, Vol. 15, No. 5, pp. 10–11, 2001.

    Article  Google Scholar 

  10. IEEE, www.ieee802.org/15/about.html

  11. I.G. Niemegeers and S.M. Heemstra de Groot, “From Personal Area Networks to Personal Networks: A User-Oriented Approach”, Kluwer International Journal of Wireless and Personal Communications, Vol. 22, No. 2, pp. 175–186, 2002.

    Article  Google Scholar 

  12. L. Capra, W. Emmerich and C. Mascolo, “Middleware for Mobile Computing”, www.cs.ucl.ac.uk/staff/L.Capra/middlewaresurvey.pdf, 2002.

  13. R. Kravets, C. Carter and L. Magalhaes, “A Cooperative Approach to User Mobility”, Computer Communication Review, Vol. 31, No. 5, pp. 57–69, 2001.

    Article  Google Scholar 

  14. B. Traversat, M. Abdelaziz, M. Duigou, J.C. Hugly, E. Pouyol and B. Yeager, “Project JXTA Virtual Network”, Sun Microsystems, Inc., February 5, 2002.

  15. T. Bray, J. Paoli and C.M. Sperberg-McQueen, “Extensible Markup Language Recommendation”, http://www.w3.org/TR/1998/REC-xml-19980210, World Wide Web Consortium, March 1998.

  16. W. Adjie-Winoto, E. Schwartz, H. Balakrishnan and J. Lilley, “The Design and Implementation of an Intentional Naming System”, Operating Systems Review, Vol. 34, No. 5, pp. 186–201, 1999.

    Article  Google Scholar 

  17. J. Veizades, E. Guttman, C. Perkins and S. Kaplan, “Service Location Protocol”, RFC 2165, IETF, June 1997.

  18. Jini ™, http://java.sun.com/products/jini/, 1998.

  19. Y. Goland, T. Cai, P. Leach, Y. Gu and S. Albright, “Simple Service Discovery Protocol/1.0”, IETF Internet Draft, expired December 1999, June 1999.

  20. Microsoft, “Understanding Universal Plug and Play”, White Paper, http://upnp.org/download/UPNP_UnderstandingUPNP.doc, Microsoft Corporation, 2000.

  21. S. Czerwinski, B. Zhao, T. Hodes, A. Joseph and R. Katz, “An Architecture for a Secure Service Discovery Service”, Proceedings ACM/IEEE Mobicom, pp. 24–35, 1999.

  22. C.E. Perkins, Ad Hoc Networking, Addison Wesley, 2001.

  23. M. Nidd, “Service Discovery in DEAPspace”, IEEE Personal Communications, Vol. 8, No. 4, pp. 39–45, 2001.

    Article  Google Scholar 

  24. G. Chen and D. Kotz, “A Survey of Context-Aware Mobile Computing Research”, Department of Computer Science, Darthmouth Computer Science Technical Report TR2000-381, Darthmouth College, 2000.

  25. T. Salonidis, P. Bhagwat, L. Tassiulas and R. LaMaire, “Distributed Topology Construction of Bluetooth Personal Area Networks”, INFOCOM 2001, Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, Proceedings, IEEE, Vol. 3, pp. 1577–1586, 2001.

    Google Scholar 

  26. C. Law and K.Y. Siu, “A Bluetooth Scatternet Formation Algorithm”, Global Telecommunications Conference, 2001, GLOBECOM '01, IEEE, Vol. 5, pp. 2864–2869, 2001.

    Google Scholar 

  27. G.V. Zaruba, S. Basagni and I. Chlamtac, “Bluetrees-Scatternet Formation to Enable Bluetooth-Based Ad Hoc Networks”, ICC 2001, IEEE International Conference on Communications 2001, Vol. 1, pp. 273–277, 11–14 June 2001.

    Google Scholar 

  28. G. Tan, A. Miu, J. Guttag and H. Balakrishnan, “Forming Scatternets from Bluetooth Personal Area Networks”, MIT Laboratory for Computer Science, MIT-LCS-TR-826, 2001.

  29. X. Hong, K. Xu and M. Gerla, “Scalable Routing Protocols for Mobile Ad Hoc Networks”, IEEE Network, pp. 11–21, July/August 2002.

  30. J. Hubeaux, T. Gross, J. Le Boudec, and M. Vetterli, “Toward Self-Organised Ad Hoc Networks: The Terminodes Project”, IEEE Communications Magazine, January 2001, pp. 118–124.

  31. IETF MANET Working Group, http://www.ietf.org/html.charters/manet-charter.html

  32. J. Broch, D.A. Maltz and D.B. Johnson, “Supporting Hierarchy and Heterogeneous Interfaces in Multi-Hop Wireless Ad Hoc Networks”, in Proceedings of IEEE International Symposium on Parallel Architectures, Algorithms, and Networks, Perth, Australia, June 23–25 1999, pp. 370–375.

  33. U. Jönsson, F. Alriksson, T. Larsson, P. Johansson and G.Q. Maguire Jr., “MIPMANET – Mobile IP for Mobile Ad Hoc Networks”, in Proceedings of the IEEE/ACM Workshop on Mobile and Ad Hoc Networking and Computing, Boston, U.S.A., August 11 2000, pp. 75–85.

  34. C. Perkins and H. Lei, “Ad Hoc Networking with Mobile IP”, in Proceedings of the Second European Personal Mobile Communication Conference, Bonn, Germany, September 30–October 2 1997, pp. 197–202.

  35. V. Typpö, “Micro-Mobility within Wireless Ad Hoc Networks: Towards Hybrid Wireless Multihop Networks”, Department of Electrical Engineering, University of Oulu, Finland, Diploma Thesis, August 2001.

  36. T. Karygiannis and L. Owens, “Wireless Network Security: 802.11”, Bluetooth and Handheld Devices, National Institute of Standards and Technology (NIST), U.S., 2002.

    Google Scholar 

  37. C. Candolin and H. Kari, “A Security Architecture for Wireless Ad Hoc Networks”, IEEE Milcom 2002, Anaheim, California, October 7–10, 2002.

  38. B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens, “An On-Demand Secure Routing Protocol Resilient to Byzantine Failures”, in ACM Workshop on Wireless Security (WiSe) in conjunction with MobiCom 2002, Atlanta, Georgia, September 28.

  39. C. Xenakis and L. Merakos, “On Demand Network-wide VPN Deployment in GPRS”, IEEE Network, Vol. 16, No. 6, pp. 28–37, 2002.

    Article  Google Scholar 

  40. J. Yong, M. Gerla and R. Gadh, “Providing Multilayer Security Support forWireless Communications across Multiple Trusted Domains”, UCLA Computer Science Technical Report, 020032.

  41. L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks”, IEEE Networks, Vol. 13, No. 6, pp. 24–30, 1999.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Niemegeers, I.G., Heemstra de Groot, S.M. Research Issues in Ad-Hoc Distributed Personal Networking. Wireless Personal Communications 26, 149–167 (2003). https://doi.org/10.1023/A:1025522402484

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1025522402484

Navigation