Skip to main content
Log in

Co-opetition Enabling Security for Cooperative Networks: Authorizing Composition Agreement Negotiations between Ambient Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Networks are under control of different authorities because of ownership. To flexibly use capabilities across network borders or to even change border, decisions are needed that effect the autonomy of organizations, which have the authority to control their networks. Co-opetition, on the other hand, where a network of stakeholders co-operate and compete to create maximum value, is one of the most important business perspectives of recent years. To support co-opetition, flexibly use of capabilities across network borders is helpful. Network composition enables to share capabilities between different networks. Determining which capabilities are desired and allowed to be shared is here understood as the result of a composition process. This composition process may encompass negotiations or it can be based on matching predefined profiles. Any non manual, adequately secured composition process between networks of different authorities, however, needs an authorization for such composition to happen between authenticated networked partners. This article presents the approach and procedure for authorizing the negotiations between networks that want to compose to improve the network owner position regarding co-opetition.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abley, J., & Bagnulo, M. (2008). Applicability statement for the level 3 Multihoming Shim Protocol. Internet-Draft draft-ietf-shim6-applicability-03, Internet Engineering Task Force, Expired.

  2. Buecker A., Andreas P., Paisley S. (2008) Understanding IT perimeter security. IBM Redbook, IBM

    Google Scholar 

  3. Charkani, N., Cano, M., Svaet, S.-W., & Johnsson, M. (2007). Migration approach of the Ambient Control Space. In Proceedings of the mobile & wireless summit 2007, Budapest, Hungary.

  4. Johnsson, M., Ohlman, B., Surtees, A., Hancock, R., Schoo, P., Ahmed, K., Pittmann, F., Rembarz, R., & Brunner, M. (2007). A future-proof network architecture. In Proceedings of the mobile & wireless summit 2007, Budapest, Hungary.

  5. Johnsson, M., Schieder, A., & Hancock, R. (2007). Final system description. Project Deliverable FP6-CALL4-027662-AN P2/D18-A.4, Ambient Networks Project, December 2007. Retreived from Ambient Networks Project Website http://www.ambient-networks.org/.

  6. Kappler, C., Mendes, P., Prehofer, C., Poyhonen, P., & Zhou, D. (2004). A framework for self-organized network composition. In Proceedings of the 1st IFIP international workshop on autonomic communication. Berlin, Germany.

  7. Kent, S., & Seo, K. (2005). Security Architecture for the Internet Protocol. RFC 4301 (Proposed Standard).

  8. Lee A.J., Winslett M., Basney J., Welch V. (2008) The traust authorization service. ACM Transactions on Information and System Security 11(1): 1–33

    Article  Google Scholar 

  9. Moskowitz, R., & Nikander, P. (2006). RFC 4423: Host Identity Protocol (HIP) Architecture.

  10. Moskowitz, R., Nikander, P., Jokela, P., & Henderson, T. R. (2007). Host Identity Protocol. IETF Internet Draft draft-ietf-hip-base-09, October 2007. Work in progress.

  11. Network Composition Feasibility Study (Release 8). (2006). Technical Report 3GPP TR 22.980 V1.0.0, 3rd Generation Partnership Project.

  12. Niebert, N. (2005). Ambient Networks: A Framework for Mobile Network Cooperation. In DIN ’05: Proceedings of the 1st ACM workshop on dynamic interconnection of networks (pp. 2–6). New York, NY, USA: ACM Press.

  13. Niebert, N., Schieder, A., Zander, J., & Hancock, R. (Eds.). (2007). Ambient Networks: Co-operative Mobile Networking for the Wireless World. Number ISBN: 978-0-470-51103-9. Wiley.

  14. Rembarz, R. (2007). Ambient Control Space Prototype Design. Project Deliverable FP6-CALL4-027662-AN P2/ D17-H.4, Ambient Networks Project, June 2007. Retrived from Ambient Networks Project Website http://www.ambient-networks.org/.

  15. Zhang X., Nakae M., Covington M.J., Sandhu R. (2008) Toward a usage-based security framework for collaborative computing systems. ACM Transactions on Information and System Security 11(1): 1–36

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peter Schoo.

Additional information

The Ambient Networks project work was supported in part by the 6th Framework program of the European Commission. The project Website is http://www.ambient-networks.org/.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Schoo, P. Co-opetition Enabling Security for Cooperative Networks: Authorizing Composition Agreement Negotiations between Ambient Networks. Wireless Pers Commun 49, 415–430 (2009). https://doi.org/10.1007/s11277-009-9696-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-009-9696-1

Keywords

Navigation