Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

被引:0
作者
徐光伟
史有群
朱明
吴国文
曹奇英
机构
[1] Department of Computer Science and Technology Donghua University
[2] Shanghai 200092
[3] Shanghai 201620 Post Doctor Station of Management Science and Engineering
[4] Tongji University
关键词
Ad Hoc; security auditing; access control of devices; sign of devices; property of event;
D O I
10.19884/j.1672-5220.2006.06.013
中图分类号
TP18 [人工智能理论]; TN929.5 [移动通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ; 081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.
引用
收藏
页码:50 / 52
页数:3
相关论文
共 50 条
  • [21] A flow-based media access control (F-MAC) for wireless ad-hoc networks
    Trung, TM
    Mo, J
    Kim, SL
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2006, E89B (03) : 756 - 763
  • [22] The security analysis for ad hoc routing protocols based on improved strand space
    Wang, Ying-long
    Wang, Ji-zhi
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 585 - +
  • [23] SEMAP: Improving multipath security based on Attacking Point in Ad hoc networks
    Lu, Zhengxin
    Huang, Chen
    Wang, Furong
    Rong, Chunming
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 134 - +
  • [24] A New Party-line Network Based on Ad Hoc Technology
    Shen, Jianjun
    Yang, Chule
    Xu, Yuqing
    2013 THE FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND EDUCATION APPLICATION (ICEA 2013), PT 2, 2013, 31 : 57 - 62
  • [25] A NOVEL ZIGBEE BASED HIGH SPEED AD HOC COMMUNICATION NETWORK
    Li, Shaosheng
    Li, Wenze
    Zhu, Jianxun
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 903 - 907
  • [26] A New Party-line Network Based on Ad Hoc Technology
    Shen, Jian-jun
    Gan, Zhi-chun
    Li, Jing-jing
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 2, 2011, : 392 - 395
  • [27] Reliability-Security Tradeoff Analysis in mmWave Ad Hoc-based CPS
    Ju, Ying
    Yang, Mingjie
    Chakraborty, Chinmay
    Liu, Lei
    Pei, Qingqi
    Xiao, Ming
    Yu, Keping
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2024, 20 (02)
  • [28] Per-Flow Fair Media Access Control in Wireless Ad-Hoc Networks
    Choi, Hong-Seok
    Lim, Jong-Tae
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (12) : 4046 - 4049
  • [29] A Risk-Based Topology Control Algorithm in Ad Hoc Networks
    Li, Hongbiao
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS SCIENCE AND ENVIRONMENTAL ENGINEERING, 2016, 52 : 283 - 286
  • [30] More Hop First Media Access Control Protocol for Ad Hoc Networks Based on EDCF and Cross-Layer Design
    Hualong, Jiang
    Hua, Long
    Lijun, Che
    PROCEEDINGS OF THE 27TH CHINESE CONTROL CONFERENCE, VOL 6, 2008, : 202 - +