skip to main content
10.1145/1143549.1143621acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
Article

Multiple personal security domains

Published: 03 July 2006 Publication History

Abstract

Mobility, usability and security are major requirements for any Ad Hoc network systems, and there have been numerous papers in regards to them. However, often these requirements are addressed separately. For a valid solution, these requirements must be considered from an integrated view. In this paper, taking into account mobility and usability, we implement a framework which allows to securely share resources and services between devices in Ad-hoc networks, based on security policies defined by the owners of those devices. In addition, we extend our framework to support inter-domain sharing of services and resources. We detail our design, present the preliminary results of our prototype, and discuss the lessons learned, in particular how user experience led to several re-designs of the initial security solution.

References

[1]
J. Beck, A. Gefflaut and N. Islam, "MoCA: A Service Framework for Mobile Computing Devices." Proceedings of the 1st ACM international workshop on Data engineering for wireless and mobile access, 1999.
[2]
B. Filho, W. Viana, R. Braga and R. Andrade, "FRAMESEC: A Framework for the Application Development with End-to-End Security Provision in the Mobile Computing Environment." Proceedings of Telecommunications AICT/SAPIR/ELETE 2005.
[3]
S.L. Keoh; E. Lupu and M. Sloman, "PEACE: a policy-based establishment of ad-hoc communities." 20th Annual Computer Security Applications Conference, 2004.
[4]
Y. Venturini et al, "Security Enforcement Layer for Security Domain." I2TS2005 - 4th International Information and Telecommunication Technologies Symposium, December 14-16, 2005.
[5]
R.R.M. Sakuragui, T.C.M.B. Carvalho and C.M. Schweitzer, "Lookup Service for Personal Distributed Network Domains." I2TS2005 - 4th International Information and Telecommunication Technologies Symposium, December 14-16, 2005.
[6]
C.M. Schweitzer, T.C.M.B. Carvalho, W. Ruggiero, "A Distributed Mechanism for Trust Propagation and Consolidation in Ad Hoc Networks.", The International Conference on Information Networking, Sendai, JAPAN, 2006.
[7]
P. Chandrasiri et al, "Personal Security Domains." Contribution to the 10th Wireless World Research Forum (WWRF), New York, October 27-28, 2003.
[8]
A. Jøsang, R. Ismail and C. Boyd, "A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems", 2005.
[9]
M. Shimaoka, "Memorandum for multidomain PKI interoperability." Proceedings of the Fifty-Seventh Internet Engineering Task Force, Vienna, Austria, 2003.
[10]
L.A. Martucci, T.C.M.B. Carvalho and W.V. Ruggiero, "A Lightweight Distributed Group Authentication Mechanism." INC2004 - Fourth International Network Conference, July 6 - 9, 2004.
[11]
C. English, S. Terzis and P. Nixon, "Towards Self-Protecting Ubiquitous Systems: Monitoring Trust-based Interactions." System Support for Ubiquitous Computing Workshop (UbiComp), Journal, Nottingham, England, Set. 2004.

Cited By

View all
  • (2009)PHD—A Generic and Flexible Architecture for IPTV in Authorized DomainsProceedings of the 2009 International Conference on Advanced Information Networking and Applications10.1109/AINA.2009.18(487-494)Online publication date: 26-May-2009
  • (2008)Security for Context-Aware ad-hoc Networking ApplicationsAdvances in Ad Hoc Networking10.1007/978-0-387-09490-8_13(145-156)Online publication date: 2008
  • (2007)Security made easy: Achieving user-friendly communication protection in ad-hoc situationsThe International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)10.1109/SECUREWARE.2007.4385324(139-144)Online publication date: Oct-2007

Index Terms

  1. Multiple personal security domains

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IWCMC '06: Proceedings of the 2006 international conference on Wireless communications and mobile computing
    July 2006
    2006 pages
    ISBN:1595933069
    DOI:10.1145/1143549
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 July 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ad hoc
    2. domains composition
    3. personal networks
    4. security domains
    5. security enforcement layer
    6. wireless networks

    Qualifiers

    • Article

    Conference

    IWCMC06
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2009)PHD—A Generic and Flexible Architecture for IPTV in Authorized DomainsProceedings of the 2009 International Conference on Advanced Information Networking and Applications10.1109/AINA.2009.18(487-494)Online publication date: 26-May-2009
    • (2008)Security for Context-Aware ad-hoc Networking ApplicationsAdvances in Ad Hoc Networking10.1007/978-0-387-09490-8_13(145-156)Online publication date: 2008
    • (2007)Security made easy: Achieving user-friendly communication protection in ad-hoc situationsThe International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)10.1109/SECUREWARE.2007.4385324(139-144)Online publication date: Oct-2007

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media