CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs

被引:0
作者
Saremi, Fatemeh [1 ]
Mashayekhi, Hoda [1 ]
Movaghar, Ali [1 ]
Jalili, Rasool [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
来源
ADVANCES IN COMPUTER SCIENCE AND ENGINEERING | 2008年 / 6卷
关键词
Cooperation; Group Management; Access Control;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Prevention of unauthorized access to services in mobile ad hoc networks is a more sophisticated problem than access control in other networks, due to interconnection facilities and lack of any fixed network infrastructure in such networks. Therefore regarding the nature of these networks, controlling access to services should be in a decentralized manner providing good performance and preserving network security. In this paper, we propose a decentralized Cooperation Enforcement Based Access Control (CEBAC) framework for mobile ad hoc networks. CEBAC comprises several groups of Service Authorizers, each issuing Credentials for access to a specific kind of services. The User Authorization for using services, besides the internal possibly traditional access control model of Service Providers, is governed by the specific threshold-based access control scheme introduced in CEBAC. In addition, a punitive mechanism is applied to mitigate the selfish behavior of authorizers and motivate them to cooperate.
引用
收藏
页码:427 / 434
页数:8
相关论文
共 50 条
  • [21] An organizational structure-based administration model for decentralized access control
    Oh, Sejong
    Byun, Changwoo
    Park, Seog
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (06) : 1465 - 1483
  • [22] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [23] XACML-Based Access Control for Decentralized Online Social Networks
    Nasim, Robayet
    Buchegger, Sonja
    2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 671 - 676
  • [24] Trusted Access Control Mechanism for Intelligent Manufacturing Based on Decentralized Identifier
    Huo, Ru
    Ni, Dong
    Shao, Zihao
    2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN, 2023, : 192 - 197
  • [25] Access Control Enforcement within MQTT-based Internet of Things Ecosystems
    Colombo, Pietro
    Ferrari, Elena
    SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 223 - 234
  • [26] Automatic enforcement of location aware user based network access control policies
    Tuglular, Tugkan
    NEW ASPECTS OF TELECOMMUNICATIONS AND INFORMATICS, 2008, : 49 - 54
  • [27] Content sensitivity based access control framework for Hadoop
    Kumar, Ashwin T. K.
    Liu, Hong
    Thomas, Johnson P.
    Hou, Xiaofeh
    DIGITAL COMMUNICATIONS AND NETWORKS, 2017, 3 (04) : 213 - 225
  • [28] Decentralized access control scheme for the dynamic group
    Wang, X. M.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 445 - 450
  • [29] Privacy aware decentralized access control system
    Shafeeq, Sehrish
    Alam, Masoom
    Khan, Abid
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 420 - 433
  • [30] Toward a decentralized trust-based access control system for dynamic collaboration
    Adams, WJ
    Davis, NJ
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 317 - 324