This document proposes a secure protocol for creating spontaneous wireless ad hoc networks. The key aspects of the protocol are:
1. It uses asymmetric cryptography for device identification and symmetric cryptography for exchanging session keys between nodes.
2. New devices authenticate by sending an identity card signed by a trusted node to validate network membership. This distributed validation avoids the need for a central authority.
3. The protocol establishes secure communication and resource/service sharing between mobile nodes in an ad hoc network without any existing infrastructure or centralized administration.