Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster ar...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Conference paper |
Published: |
2023
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-30761 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-307612023-12-29T15:52:46Z Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks Bakar A.A. Ismail R. Ahmad A.R. Abdul Manan J.-L. Jais J. 35178991300 15839357700 35589598800 36026786500 57212154525 Access control ERM Information sharing MANET Ad hoc networks Information dissemination Information retrieval Mobile ad hoc networks Mobile telecommunication systems Security systems Telecommunication networks Access control architecture Access control schemes Ad hoc environment Disaster areas Emergency rescue ERM Group-based Information need Information sharing Malicious nodes Proposed architectures Rescue missions Access control In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working. Copyright 2009 ACM. Final 2023-12-29T07:52:45Z 2023-12-29T07:52:45Z 2009 Conference paper 10.1145/1821748.1821833 2-s2.0-77955119259 https://www.scopus.com/inward/record.uri?eid=2-s2.0-77955119259&doi=10.1145%2f1821748.1821833&partnerID=40&md5=cf525872516e695abb57bdabc549d616 https://irepository.uniten.edu.my/handle/123456789/30761 436 451 Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
topic |
Access control ERM Information sharing MANET Ad hoc networks Information dissemination Information retrieval Mobile ad hoc networks Mobile telecommunication systems Security systems Telecommunication networks Access control architecture Access control schemes Ad hoc environment Disaster areas Emergency rescue ERM Group-based Information need Information sharing Malicious nodes Proposed architectures Rescue missions Access control |
spellingShingle |
Access control ERM Information sharing MANET Ad hoc networks Information dissemination Information retrieval Mobile ad hoc networks Mobile telecommunication systems Security systems Telecommunication networks Access control architecture Access control schemes Ad hoc environment Disaster areas Emergency rescue ERM Group-based Information need Information sharing Malicious nodes Proposed architectures Rescue missions Access control Bakar A.A. Ismail R. Ahmad A.R. Abdul Manan J.-L. Jais J. Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks |
description |
In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working. Copyright 2009 ACM. |
author2 |
35178991300 |
author_facet |
35178991300 Bakar A.A. Ismail R. Ahmad A.R. Abdul Manan J.-L. Jais J. |
format |
Conference paper |
author |
Bakar A.A. Ismail R. Ahmad A.R. Abdul Manan J.-L. Jais J. |
author_sort |
Bakar A.A. |
title |
Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks |
title_short |
Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks |
title_full |
Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks |
title_fullStr |
Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks |
title_full_unstemmed |
Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks |
title_sort |
group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks |
publishDate |
2023 |
_version_ |
1806424398870085632 |
score |
13.214268 |