CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs

被引:0
作者
Saremi, Fatemeh [1 ]
Mashayekhi, Hoda [1 ]
Movaghar, Ali [1 ]
Jalili, Rasool [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
来源
ADVANCES IN COMPUTER SCIENCE AND ENGINEERING | 2008年 / 6卷
关键词
Cooperation; Group Management; Access Control;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Prevention of unauthorized access to services in mobile ad hoc networks is a more sophisticated problem than access control in other networks, due to interconnection facilities and lack of any fixed network infrastructure in such networks. Therefore regarding the nature of these networks, controlling access to services should be in a decentralized manner providing good performance and preserving network security. In this paper, we propose a decentralized Cooperation Enforcement Based Access Control (CEBAC) framework for mobile ad hoc networks. CEBAC comprises several groups of Service Authorizers, each issuing Credentials for access to a specific kind of services. The User Authorization for using services, besides the internal possibly traditional access control model of Service Providers, is governed by the specific threshold-based access control scheme introduced in CEBAC. In addition, a punitive mechanism is applied to mitigate the selfish behavior of authorizers and motivate them to cooperate.
引用
收藏
页码:427 / 434
页数:8
相关论文
共 50 条
[41]   Policy-based access control framework for grid computing [J].
Wu, Jin ;
Leangsuksun, Chokchai Box ;
Rampure, Vishal ;
Ong, Hong .
SIXTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID: SPANNING THE WORLD AND BEYOND, 2006, :391-+
[42]   Trust Based Access Control Framework for R-OSGi [J].
Zhang, Luyang ;
Rao, Ruonan .
2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
[43]   IOTA-Based Access Control Framework for the Internet of Things [J].
Nakanishi, Ruka ;
Zhang, Yuanyu ;
Sasabe, Masahiro ;
Kasahara, Shoji .
2020 2ND CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS), 2020, :87-91
[44]   A Novel Generalized Framework for Access Control Based on the Immune Mechanism [J].
Wang, Lei ;
Yin, Caiyan ;
Dong, Han .
2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, :1427-1431
[45]   A graph-based framework for the analysis of access control policies [J].
Alves, Sandra ;
Fernandez, Maribel .
THEORETICAL COMPUTER SCIENCE, 2017, 685 :3-22
[46]   Risk Based Mobile Access Control (RiBMAC) Policy Framework [J].
Luo, Jim ;
Kang, Myong .
2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, :1448-1453
[47]   TXACML - An access control policy framework based on trusted platform [J].
Nie, Xiaowei ;
Feng, Dengguo .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2008, 45 (10) :1676-1686
[48]   A Framework for Risk-Aware Role Based Access Control [J].
Bijon, Khalid Zaman ;
Krishnan, Ram ;
Sandhu, Ravi .
2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, :462-469
[49]   Clustering subjects in a credential-based access control framework [J].
Stoupa, K. ;
Vakali, A. .
COMPUTERS & SECURITY, 2007, 26 (02) :120-129
[50]   An Integrated Privacy Preserving Attribute Based Access Control Framework [J].
Xu, Runhua ;
Joshi, James B. D. .
PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2016, :68-76