Conference Paper

Group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks.

DOI: 10.1145/1821748.1821833 Conference: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia
Source: DBLP

ABSTRACT In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working.

  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: A new context aware access control architecture called Anonymous Context Aware Access Control Architecture (ACA2) is proposed. The basic idea of this architecture is based on an analogy to the public telephone service. Anonymous users can use services supported by their context information through preregistered software components called proxies. The main features of the architecture include anonymity, access suspension caused by context changes, and active context certificates with stream verification.
    Mobile Data Management, 2006. MDM 2006. 7th International Conference on; 06/2006
  • [Show abstract] [Hide abstract]
    ABSTRACT: The rapid growth of wireless network technology and the deployment of mobile computing devices have enabled the construction of pervasive computing environment. In pervasive computing environment, it is proliferated that many new applications that provide active and intelligent services by context information are collected by pervasive sensor devices. These new applications called context-aware applications must require new security mechanisms and policies different from typical ones. Specially, access control mechanism supports security policy that is based on context information, in order to provide automating context-aware services. So, this paper analyzes various access control mechanisms and proposes a context-role based access control mechanism for context-aware application.
    High Performance Computing and Communications, Second International Conference, HPCC 2006, Munich, Germany, September 13-15, 2006, Proceedings; 01/2006
  • [Show abstract] [Hide abstract]
    ABSTRACT: Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. In particular, mobility of users/devices causes frequent and unpredictable changes in physical user location and in consequently available resources and services. Users can also change portable access devices, with different capabilities, even at runtime and during the same service session, thus forcing us to consider very dynamic aspects even due to client heterogeneity. Access control to resources is crucial to leverage the provision of ubiquitous services and calls for novel solutions based on various context information, e.g., user/device location, device properties, user needs, local resource visibility. This paper presents a novel access control model built upon the concept of context as the first-class design principle to rule access to resources. As key features, this model allows to associate access control permissions with contexts where users operate and users acquire/lose their permissions when entering/leaving a specific context. Unlike traditional access control solutions where user identity/role triggers policy evaluation when requesting resource access, this model exploits the user context to fully determine the set of available permissions. In addition, the proposed model allows to express context-based access control policies at a high level of abstraction cleanly separate from service logic implementation, thus promoting dynamic policy modification with no impact on the service code. The paper shows the implementation of the proposed model in the UbiCOSM framework and presents a mobile office service provisioning scenario.
    28th International Computer Software and Applications Conference (COMPSAC 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings; 01/2004