Skip to main content

Conflict Resolution in Heterogeneous Co-allied MANET: A Formal Approach

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8314))

Abstract

Implementing a conflict free access control policies for coallied networks where different organizations involve for a common goal is becoming important. In mission-critical scenarios, different organizational networks cooperate to form a single mobile ad hoc network to implement their respective operations. These teams (or quads) are operated under different set of local policies for their own security, which results heterogeneity in access control. Each team wants to preserve its access control policies at maximum level. Moreover, a set of allied policies governs the interaction among the different teams, which may conflict with their local policies. In mobile ad hoc networks this becomes more challenging due to absence of network perimeter and mobility. In addition, the policy rules may have local and transitive conflicts. To achieve successful completion of the mission, compromising with the stringency of the enforcement of the conflicting rules for the quads may be required. In this paper, we propose a formal method to find the optimal negotiation of the policy rules to preserve the mission. The efficacy of the work lies on optimizing the enforcement of access control policies to achieve the coalition instead of negating the policy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bettstetter, C., Resta, G., Santi, P.: The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Transactions on Mobile Computing 2(3), 257–269 (2003)

    Article  Google Scholar 

  2. Fu, Z., Marhajan, Y., Malik, S.: zchaff. Research Web Page. Princeton University, USA (March 2007), http://www.princeton.edu/~chaff/zchaff.html

  3. Li, X.Y., et al.: Optimization algorithms for the minimum-cost satisfiability problem. North Carolina State University (2004)

    Google Scholar 

  4. Dillig, I., Dillig, T., McMillan, K.L., Aiken, A.: Minimum satisfying assignments for SMT. In: Madhusudan, P., Seshia, S.A. (eds.) CAV 2012. LNCS, vol. 7358, pp. 394–409. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  5. Maity, S., Ghosh, S.K.: A cognitive trust model for access control framework in manet. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 75–88. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  6. Zhao, H., Lobo, J., Roy, A., Bellovin, S.M.: Policy refinement of network services for MANETs. In: The 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011), Dublin, Ireland (2011)

    Google Scholar 

  7. Alicherry, M., Keromytis, A.D.: DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. In: Fourth International Conference on Network and System Security, pp. 89–98. IEEE (2011)

    Google Scholar 

  8. Von Mulert, J., Welch, I., Seah, W.K.G.: Security threats and solutions in manets: A case study using aodv and saodv. Journal of Network and Computer Applications 35(4), 1249–1259 (2012)

    Article  Google Scholar 

  9. Maity, S., Ghosh, S.K.: Enforcement of access control policy for mobile ad hoc networks. In: Proceedings of the Fifth International Conference on Security of Information and Networks, pp. 47–52. ACM (2012)

    Google Scholar 

  10. Bera, P., Ghosh, S.K., Dasgupta, P.: Policy based security analysis in enterprise networks: A formal approach. IEEE Transactions on Network and Service Management 7(4), 231–243 (2010)

    Article  Google Scholar 

  11. Maity, S., Bera, P., Ghosh, S.K.: A mobile ip based wlan security management framework with reconfigurable hardware acceleration. In: Proceedings of the 3rd International Conference on Security of Information and Networks, pp. 218–223. ACM (2010)

    Google Scholar 

  12. Ao, X., Minsky, N.H.: Flexible regulation of distributed coalitions. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 39–60. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Srivatsa, M., Agrawal, D., Balfe, S.: Bootstrapping coalition manets. IBM Research Report RC24588 (2008)

    Google Scholar 

  14. Wijesekera, D., Jajodia, S.: A propositional policy algebra for access control. ACM Transactions on Information and System Security (TISSEC) 6(2), 286–325 (2003)

    Article  Google Scholar 

  15. Janicke, H., Cau, A., Siewe, F., Zedan, H.: Dynamic access control policies: specification and verification. The Computer Journal 56(4), 440–463 (2013)

    Article  Google Scholar 

  16. Beigi, M., Lobo, J., Grueneberg, K., Calo, S., Karat, J.: A negotiation framework for negotiation of coalition policies. In: 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, pp. 133–136. IEEE (2010)

    Google Scholar 

  17. Chen, K., Qiu, X., Yang, Y., Rui, L.: Negotiation-based service self-management mechanism in the manets. In: 2011 13th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1–7. IEEE (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Maity, S., Ghosh, S.K. (2014). Conflict Resolution in Heterogeneous Co-allied MANET: A Formal Approach. In: Chatterjee, M., Cao, Jn., Kothapalli, K., Rajsbaum, S. (eds) Distributed Computing and Networking. ICDCN 2014. Lecture Notes in Computer Science, vol 8314. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45249-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45249-9_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45248-2

  • Online ISBN: 978-3-642-45249-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics