Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

被引:0
作者
徐光伟
史有群
朱明
吴国文
曹奇英
机构
[1] Department of Computer Science and Technology Donghua University
[2] Shanghai 200092
[3] Shanghai 201620 Post Doctor Station of Management Science and Engineering
[4] Tongji University
关键词
Ad Hoc; security auditing; access control of devices; sign of devices; property of event;
D O I
10.19884/j.1672-5220.2006.06.013
中图分类号
TP18 [人工智能理论]; TN929.5 [移动通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ; 081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.
引用
收藏
页码:50 / 52
页数:3
相关论文
共 50 条
  • [41] A SINR based Clustering Protocol for Cognitive Radio Ad Hoc Network (CRAHN)
    Dutta, Nitul
    Sarma, Hiren Kumar Deva
    Srivastava, Ashish
    Verma, Shekhar
    2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT), 2014, : 69 - 75
  • [42] Transmission Power Control using Deep Neural Networks in TDMA-based Ad-hoc Network Clusters
    Azoulay, Rina
    Danilchenko, Kiril
    Haddad, Yoram
    Reches, Shulamit
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 406 - 411
  • [43] Performance Test and Analysis of Multi-hop Network Based on UAV Ad Hoc Network Experiment
    Wang, Xudong
    Mi, Zhichao
    Wang, Hai
    Zhao, Ning
    2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,
  • [44] PROBABILITY OF PACKET SUCCESS OF AD HOC NETWORKS WITH SIB BASED POWER CONTROL
    Li Nana
    Gan Yong
    Chen Changhai
    Feng Yuan
    Chen Yan
    PROCEEDINGS OF 2009 2ND IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2009, : 52 - +
  • [45] Research on cross-layer congestion control strategy based on multi-agent reinforcement learning in Ad hoc network
    Shao F.
    Wu C.
    Wang L.-F.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (06): : 1520 - 1524
  • [46] A lightweight nifulticast routing approach for ad hoc mobile network based on dense zones
    Zebdi, A
    Bensaber, BA
    Mesfioui, M
    Proceedings of the IASTED International Conference Communication Systems and Networks, 2004, : 59 - 64
  • [47] EUROPCOM - An Ultra-WideBand (UWB)-based ad hoc network for emergency applications
    Lo, Anthony
    Xia, Liang
    Niemegeers, Ignas
    Bauge, Timothy
    Russell, Mark
    Harmer, Dave
    2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, : 6 - +
  • [48] An Aeronautical Ad Hoc Network Routing Protocol based on Air Vehicles Movement Features
    Zhong, Dong
    Wang, Yining
    Zhu, Yi'an
    You, Tao
    2016 22ND INTERNATIONAL CONFERENCE ON APPLIED ELECTROMAGNETICS AND COMMUNICATIONS (ICECOM), 2016,
  • [49] MAC layer congestion control techniques in vehicular ad hoc network: survey and qualitative analysis
    Sharma, Swati
    Harit, Sandeep
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 35 (01) : 17 - 37
  • [50] Research on Cross - layer Multicast Routing Algorithm Based on Cognitive Ad Hoc Network
    Liu, Jianpo
    Yuan, Xiaobing
    Qian, Hanwang
    Cheng, Yongbo
    Liu, Falin
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3225 - 3228