skip to main content
10.1145/1821748.1821833acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks

Published: 14 December 2009 Publication History

Abstract

In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working.

References

[1]
A. A. Bakar., R. Ismail, J. A. Manan., A. R. Ahmad, J, Jais "A Secure Access Control Architecture For Mobile Ad-Hoc Networks", SCORED 2009, College of Graduate Studies, Universiti Tenaga Nasional, Malaysia, 4--5 August 2009.
[2]
A. A. Bakar., R. Ismail, J. A. Manan., A. R. Ahmad, J, Jais "Proxy Delegation with Warrant using RSA signature scheme for Mobile Ad-hoc Network", to be appeared in 3rd International Conference on Informatics and Technology 2009, Informatics', 09, Kuala Lumpur, Malaysia, 27--28 October 2009.
[3]
A. A. Bakar., R. Ismail, J. A. Manan., A. R. Ahmad, J, Jais "Group Based Access Control scheme(GBAC): Keeping Information Sharing Secure in Mobile Ad-Hoc Environment", to be appeared in Fourth International Conference on Digital Information Management(ICDIM 2009), University of Michigan, Ann Arbor, Michigan, USA, 1--4 November 2009.
[4]
A. Corradi, R. Montanari, D. Tibaldi "Context-based Access Control for Ubiquitous Service Provisioning" Proc. of the 28th Annual International Computer Software and Applications Conference (COMPSAC'04), IEEE, 2004.
[5]
Anand. T. Tanvir, Ahmad., Devdatta, K., Richa, K., Komal, K.," Context --Based Secure Resource Access in Pervasive Computing Environments", Proc. of the second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04), 2004.
[6]
D. R. Stinson, Crytography: Theory and Practice, CRC Press, 2002
[7]
G. Zhang, M. Parashar "Context-aware Dynamic Access Control for Pervasive Applications" Proc. Of the Communication Networks and Distributed System Modeling and Simulation Conference (CNDS 2004), San Diego CA, USA, January 2004, pp. 219--225.
[8]
Gua. Y. J., Hong, F., Zhang, Q. G., Li, R., "An Access Control model for Ubiquitous Computing Applications", in Proc. Second International Conference on Mobile Technoligies, Application and System, 2005.
[9]
H. Yao, H. Hu, B. Huang, R. Li," Dynamic Role and Context Based Access Control for Grid Applications", Proc. Of the sixth International Conference on Parallel and Distributed Computing, Application and Technology (PDCAT'05), December 05--08, 2005.
[10]
J. Jin, G. J. Ahn," Role-based Access Managemnet for Ad-Hoc Collaborative Sharing", SACMAT 06, Lake Tahoe, California, USA, ACM 2006, pp. 200--209
[11]
J. A. Buchmann, Introduction To Cryptography, Springer-Verlag, 2001
[12]
K. Hoeper, and G. Gong, "Models of Authentications in Ad Hoc Networks and their Related Network Properties," International Association for Cryptologic Research, http://www.iacr.org/, 2004.
[13]
MANET (Mobile Ad Hoc Network)- http://www.techterms.com/definition/manet Date extract-3-3-2009
[14]
R. Steffen, R. Knorr," A Trust Based Delegation System for managing Access Control", In advances in Pervasive Computing: Adjunct Proc. Pervasive 2005
[15]
Smart, N., Cryptography: An Introduction, Mc Graw-Hill, UK, 2003.
[16]
S. L. Keoh, E. Lupu, "An Efficient Access Control for Mobile Ad-Hoc Communities", SPC 2005, LNCS 3340, Springer-Verlag Berlin Heidelberg, 2005, pp. 210--224.
[17]
S. Sadat. Emami, M. Amini, S. Zokaei "A Context-Aware Access Control Model for Pervasive Computing Environments" International Conference on Intelligent Pervasive Computing, IEEE, 2007.
[18]
S. Yokoyama, E. Kamioka, S. Yamada" An Anonymous Context Aware Control Architecture for Ubiquitous Services" Proc. of the 7th International Conference on Mobile Data Management(MDM'06), IEEE, 2006.
[19]
Seon-Ho, P, Young-Yu, H., Tai-Myoung, C.," Context-Roles Based Access Control for Context Aware Applications", LNSC4208, pp. 572--580, Springer-Verlag, 2006.
[20]
T. H. Lim, S. U. Shin," Intelligent Access Control Mechanism for Ubiquitous Applications", 6th IEEE/ACIS International Conference on Computer and Information Science(ICIS 2007), 2007.
[21]
T. Plagemann, J. Anderson, O. Drugan, V. Goebel, C. Griwodz, P. Halvorsen, E. Munthe --Kaas, N. Sanderson, K. S. Skjelsvik, Middleware Services for Information Sharing in Mobile Ad-Hoc Networks-Challenges and Approach, Book Chapter, pp. 225--236, Springer, Boston, 2005.
[22]
Xianxi, H., Haiyang, W., Zhenxiang, C., Jinjiou, L.,"AContext, Rule and RBAC access control in enterprise pervasive computing environment", 1st International Symposium on Pervasive Computing and Applications, pp. 497--502, 3--5 August, 2006.

Cited By

View all

Index Terms

  1. Group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MoMM '09: Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
    December 2009
    663 pages
    ISBN:9781605586595
    DOI:10.1145/1821748
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Johannes Kepler University

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 December 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ERM
    2. MANET
    3. access control
    4. information sharing

    Qualifiers

    • Research-article

    Conference

    MoMM '09
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Footsteps in the fogComputers and Security10.1016/j.cose.2022.102866121:COnline publication date: 1-Oct-2022
    • (2016)Android Mobile Application for Privacy Data Access in MANET Emergency ServicesInformation Science and Applications (ICISA) 201610.1007/978-981-10-0557-2_61(623-631)Online publication date: 16-Feb-2016
    • (2015)Formulating Heterogeneous Access Control model for MANET Emergency ServicesJournal of Networks10.4304/jnw.10.7.407-41210:7Online publication date: 17-Aug-2015
    • (2014)An authentication mechanism for heterogeneous access control model in MANET emergency rescue missionProceedings of the 6th International Conference on Information Technology and Multimedia10.1109/ICIMU.2014.7066611(97-101)Online publication date: Nov-2014
    • (2014)Access control and privacy in MANET emergency environment2014 International Conference on Computer and Information Sciences (ICCOINS)10.1109/ICCOINS.2014.6868389(1-6)Online publication date: Jun-2014

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media