CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs

被引:0
|
作者
Saremi, Fatemeh [1 ]
Mashayekhi, Hoda [1 ]
Movaghar, Ali [1 ]
Jalili, Rasool [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
关键词
Cooperation; Group Management; Access Control;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Prevention of unauthorized access to services in mobile ad hoc networks is a more sophisticated problem than access control in other networks, due to interconnection facilities and lack of any fixed network infrastructure in such networks. Therefore regarding the nature of these networks, controlling access to services should be in a decentralized manner providing good performance and preserving network security. In this paper, we propose a decentralized Cooperation Enforcement Based Access Control (CEBAC) framework for mobile ad hoc networks. CEBAC comprises several groups of Service Authorizers, each issuing Credentials for access to a specific kind of services. The User Authorization for using services, besides the internal possibly traditional access control model of Service Providers, is governed by the specific threshold-based access control scheme introduced in CEBAC. In addition, a punitive mechanism is applied to mitigate the selfish behavior of authorizers and motivate them to cooperate.
引用
收藏
页码:427 / 434
页数:8
相关论文
共 50 条
  • [31] On Risk in Access Control Enforcement
    Petracca, Giuseppe
    Capobianco, Frank
    Skalka, Christian
    Jaeger, Trent
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 31 - 42
  • [32] Access Control Enforcement Testing
    El Kateb, Donia
    ElRakaiby, Yehia
    Mouelhi, Tejeddine
    Le Traon, Yves
    2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST), 2013, : 64 - 70
  • [33] The Policy Machine: A novel architecture and framework for access control policy specification and enforcement
    Ferraiolo, David
    Atluri, Vijayalakshmi
    Gavrila, Serban
    JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (04) : 412 - 424
  • [34] Decentralized cooperation control of redundant manipulators
    Liu, YH
    Arimoto, S
    ROBOT CONTROL 1997, VOLS 1 AND 2, 1998, : 625 - 630
  • [35] A reputation based scheme for stimulating cooperation in MANETs
    Balasubramanian, AR
    Ghosh, J
    Wang, X
    PERFORMANCE CHALLENGES FOR EFFICIENT NEXT GENERATION NETWORKS, VOLS 6A-6C, 2005, 6A-6C : 543 - 552
  • [36] A policy based framework for access control
    Nabhen, R
    Jamhour, E
    Maziero, C
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 47 - 59
  • [37] A Blockchain-based Decentralized Data Storage and Access Framework for PingER
    Ali, Saqib
    Wang, Guojun
    White, Bebo
    Cottrell, Roger Leslie
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1303 - 1308
  • [38] Label-based access control policy enforcement and management
    Zhou, Wei
    Raja, Vinesh H.
    Meinel, Christoph
    Ahmad, Munir
    SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 395 - +
  • [39] Access control based on RBAC in distributed cooperation environment
    Yin Shao-hong
    Wang Wei
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 119 - +
  • [40] Access Control for Cooperation Systems Based on Group Situation
    Kim, Minsoo
    Joshi, James B. D.
    Kim, Minkoo
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2009, 10 : 11 - +