MuSE: Novel Efficient Multi-Tier Communication Security Model for Emergency and Rescue Operations

For efficient emergency process management in large scale disaster situations, fast and secure access to sensitive information of heterogeneous organizations is an indispensable goal. For this purpose, we propose a novel Multi-tier communication Security model for Emergency and rescue operations (MuSE) that addresses an acceptable trade-off between performance and security of information exchange in those environments. Based on in-depth user requirements analysis, MuSE deals with the communication system upon three tiers: federation, incident network and mobile client. At the federation tier, MuSE specifies an efficient Role- and Certificate-based Single Sign On solution (RC-SSO) for interorganization communication. In contrast to its counterparts such as SAML, RC-SSO does not depend on an identity provider and reduces the SSO steps to a minimum. At the incident network tier, MuSE prescribes a Position Aware Secure and Efficient Route discovery protocol (PASER). It aims to secure the network based on lightweight cryptography. PASER deals with the network in a hierarchical way and supports nodes positions' exchange, providing both satisfying level of security as well as an advanced network management. At the mobile client tier, MuSE restricts the network access to the rescue fighters' clients based on the lightweight standard EAP-PSK and a novel TETRA-based Dynamic key Distribution method (TEDDi).

[1]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[2]  C. Wietfeld,et al.  Performance Analysis of Highly Available Ad Hoc Surveillance Networks Based on Dropped Units , 2008, 2008 IEEE Conference on Technologies for Homeland Security.

[3]  Christian Wietfeld,et al.  A Novel Role- and Certificate-Based Single Sign-On System for Emergency Rescue Operations , 2011, 2011 IEEE International Conference on Communications (ICC).

[4]  Christian Wietfeld,et al.  Approaches for optimizing the performance of a mobile SAML-based emergency response system , 2009, 2009 13th Enterprise Distributed Object Computing Conference Workshops.

[5]  Donald P. McGarry,et al.  IC.NET — Incident Command “Net”: A system using EDXL-DE for intelligent message routing , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).

[6]  J.W. Morentz Unified Incident Command and Decision Support (UICDS): A Department of Homeland Security Initiative in Information Sharing , 2008, 2008 IEEE Conference on Technologies for Homeland Security.

[7]  Christian Wietfeld,et al.  SPIDER: Enabling interoperable information sharing between public institutions for efficient disaster recovery and response , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).

[8]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[9]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[10]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[11]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).