Abstract
Implementing a conflict free access control policies for coallied networks where different organizations involve for a common goal is becoming important. In mission-critical scenarios, different organizational networks cooperate to form a single mobile ad hoc network to implement their respective operations. These teams (or quads) are operated under different set of local policies for their own security, which results heterogeneity in access control. Each team wants to preserve its access control policies at maximum level. Moreover, a set of allied policies governs the interaction among the different teams, which may conflict with their local policies. In mobile ad hoc networks this becomes more challenging due to absence of network perimeter and mobility. In addition, the policy rules may have local and transitive conflicts. To achieve successful completion of the mission, compromising with the stringency of the enforcement of the conflicting rules for the quads may be required. In this paper, we propose a formal method to find the optimal negotiation of the policy rules to preserve the mission. The efficacy of the work lies on optimizing the enforcement of access control policies to achieve the coalition instead of negating the policy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Bettstetter, C., Resta, G., Santi, P.: The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Transactions on Mobile Computing 2(3), 257–269 (2003)
Fu, Z., Marhajan, Y., Malik, S.: zchaff. Research Web Page. Princeton University, USA (March 2007), http://www.princeton.edu/~chaff/zchaff.html
Li, X.Y., et al.: Optimization algorithms for the minimum-cost satisfiability problem. North Carolina State University (2004)
Dillig, I., Dillig, T., McMillan, K.L., Aiken, A.: Minimum satisfying assignments for SMT. In: Madhusudan, P., Seshia, S.A. (eds.) CAV 2012. LNCS, vol. 7358, pp. 394–409. Springer, Heidelberg (2012)
Maity, S., Ghosh, S.K.: A cognitive trust model for access control framework in manet. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 75–88. Springer, Heidelberg (2012)
Zhao, H., Lobo, J., Roy, A., Bellovin, S.M.: Policy refinement of network services for MANETs. In: The 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011), Dublin, Ireland (2011)
Alicherry, M., Keromytis, A.D.: DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. In: Fourth International Conference on Network and System Security, pp. 89–98. IEEE (2011)
Von Mulert, J., Welch, I., Seah, W.K.G.: Security threats and solutions in manets: A case study using aodv and saodv. Journal of Network and Computer Applications 35(4), 1249–1259 (2012)
Maity, S., Ghosh, S.K.: Enforcement of access control policy for mobile ad hoc networks. In: Proceedings of the Fifth International Conference on Security of Information and Networks, pp. 47–52. ACM (2012)
Bera, P., Ghosh, S.K., Dasgupta, P.: Policy based security analysis in enterprise networks: A formal approach. IEEE Transactions on Network and Service Management 7(4), 231–243 (2010)
Maity, S., Bera, P., Ghosh, S.K.: A mobile ip based wlan security management framework with reconfigurable hardware acceleration. In: Proceedings of the 3rd International Conference on Security of Information and Networks, pp. 218–223. ACM (2010)
Ao, X., Minsky, N.H.: Flexible regulation of distributed coalitions. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 39–60. Springer, Heidelberg (2003)
Srivatsa, M., Agrawal, D., Balfe, S.: Bootstrapping coalition manets. IBM Research Report RC24588 (2008)
Wijesekera, D., Jajodia, S.: A propositional policy algebra for access control. ACM Transactions on Information and System Security (TISSEC) 6(2), 286–325 (2003)
Janicke, H., Cau, A., Siewe, F., Zedan, H.: Dynamic access control policies: specification and verification. The Computer Journal 56(4), 440–463 (2013)
Beigi, M., Lobo, J., Grueneberg, K., Calo, S., Karat, J.: A negotiation framework for negotiation of coalition policies. In: 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, pp. 133–136. IEEE (2010)
Chen, K., Qiu, X., Yang, Y., Rui, L.: Negotiation-based service self-management mechanism in the manets. In: 2011 13th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1–7. IEEE (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maity, S., Ghosh, S.K. (2014). Conflict Resolution in Heterogeneous Co-allied MANET: A Formal Approach. In: Chatterjee, M., Cao, Jn., Kothapalli, K., Rajsbaum, S. (eds) Distributed Computing and Networking. ICDCN 2014. Lecture Notes in Computer Science, vol 8314. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45249-9_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-45249-9_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-45248-2
Online ISBN: 978-3-642-45249-9
eBook Packages: Computer ScienceComputer Science (R0)