Abstract: The main aspect of wireless ad hoc network communication is using of security so this paper proposing a secure protocol for spontaneous wireless ad hoc network. This protocol offers network creation, and management of communication within a spontaneous network. We introduce the notion of a spontaneous wireless network, created when a number of peoples come together for certain period of time, for collaborative activities. This protocol includes all functions need to operate without any external supports. Protocol runs on the basis of trust between the collaborating peoples in the network. It uses a hybrid symmetric and asymmetric key encryption schemes for user authentication. This paper describes a secure protocol with an intrusion detection mechanism for spontaneous wireless ad hoc network
[1] L.M. Feeney, B. Ahlgren, and A. Westerlund, "Spontaneous Networking: An Application-Oriented Approach to Ad-hoc Networking," IEEE Comm. Magazine, vol. 39, no. 6, pp. 176-181, June 2001.
[2] J. Lloret, L. Shu, R. Lacuesta, and M. Chen, "User-Oriented and Service-Oriented Spontaneous Ad Hoc and Sensor Wireless Networks," Ad Hoc and Sensor Wireless Networks, vol. 14, nos. 1/ 2, pp. 1-8, 2012.
[3] Xiao Y. Rayi V.K., Sun B., Du X., Hu F. and Galloway M. (Sept.2007)"A Survey of Key Management Schemes in Wireless Sensor Networks," Computer Comm., vol. 30, nos. 11/12, pp. 2314-2341.
[4] Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A Survey of Key Management Schemes in Wireless Sensor Networks," Computer Comm., vol. 30, nos. 11/12, pp. 2314-2341, Sept.2007.
[5] V. Kumar and M.L. Das, "Securing Wireless Sensor Networks With Public Key Techniques," Ad Hoc and Sensor Wireless Networks, vol. 5, nos. 3/4, pp. 189-201, 2008.
[6] R. Lacuesta, J. Lloret, M. Garcia, and L. Pen˜ alver, "A Spontaneous Ad-Hoc Network to Share WWW Access," EURASIP J. WirelessComm. and Networking, vol. 2010, article 18, 2010.