Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks

In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster ar...

Full description

Saved in:
Bibliographic Details
Main Authors: Bakar A.A., Ismail R., Ahmad A.R., Abdul Manan J.-L., Jais J.
Other Authors: 35178991300
Format: Conference paper
Published: 2023
Subjects:
ERM
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-30761
record_format dspace
spelling my.uniten.dspace-307612023-12-29T15:52:46Z Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks Bakar A.A. Ismail R. Ahmad A.R. Abdul Manan J.-L. Jais J. 35178991300 15839357700 35589598800 36026786500 57212154525 Access control ERM Information sharing MANET Ad hoc networks Information dissemination Information retrieval Mobile ad hoc networks Mobile telecommunication systems Security systems Telecommunication networks Access control architecture Access control schemes Ad hoc environment Disaster areas Emergency rescue ERM Group-based Information need Information sharing Malicious nodes Proposed architectures Rescue missions Access control In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working. Copyright 2009 ACM. Final 2023-12-29T07:52:45Z 2023-12-29T07:52:45Z 2009 Conference paper 10.1145/1821748.1821833 2-s2.0-77955119259 https://www.scopus.com/inward/record.uri?eid=2-s2.0-77955119259&doi=10.1145%2f1821748.1821833&partnerID=40&md5=cf525872516e695abb57bdabc549d616 https://irepository.uniten.edu.my/handle/123456789/30761 436 451 Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
topic Access control
ERM
Information sharing
MANET
Ad hoc networks
Information dissemination
Information retrieval
Mobile ad hoc networks
Mobile telecommunication systems
Security systems
Telecommunication networks
Access control architecture
Access control schemes
Ad hoc environment
Disaster areas
Emergency rescue
ERM
Group-based
Information need
Information sharing
Malicious nodes
Proposed architectures
Rescue missions
Access control
spellingShingle Access control
ERM
Information sharing
MANET
Ad hoc networks
Information dissemination
Information retrieval
Mobile ad hoc networks
Mobile telecommunication systems
Security systems
Telecommunication networks
Access control architecture
Access control schemes
Ad hoc environment
Disaster areas
Emergency rescue
ERM
Group-based
Information need
Information sharing
Malicious nodes
Proposed architectures
Rescue missions
Access control
Bakar A.A.
Ismail R.
Ahmad A.R.
Abdul Manan J.-L.
Jais J.
Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
description In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working. Copyright 2009 ACM.
author2 35178991300
author_facet 35178991300
Bakar A.A.
Ismail R.
Ahmad A.R.
Abdul Manan J.-L.
Jais J.
format Conference paper
author Bakar A.A.
Ismail R.
Ahmad A.R.
Abdul Manan J.-L.
Jais J.
author_sort Bakar A.A.
title Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
title_short Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
title_full Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
title_fullStr Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
title_full_unstemmed Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
title_sort group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks
publishDate 2023
_version_ 1806424398870085632
score 13.214268