Accountability for wireless LANs, ad hoc networks, and wireless mesh networks

Accountability is an extremely important issue in computer and network systems. One of the goals of accountability is the capability to trace an event (e.g., the leaking of secure information or an outside attack), even after the event occurred so that the causes can be determined. This article first provides a survey of accountability with a general overview of the topic, using electronic patient records and various computer and network attacks as a model. Then, it describes and analyzes practical framework applications of accountability systems. An insurable network architecture, called A-NET is proposed. Then, an algorithm to achieve true accountable administration is proposed, namely, that an administrator's activities must be accountable. Finally, accountability for wireless LANs, ad hoc networks, and wireless mesh networks are studied.

[1]  Michiharu Kudo,et al.  Electronic submission protocol based on temporal accountability , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[2]  Biswanath Mukherjee,et al.  Analysis of an algorithm for distributed recognition and accountability , 1993, CCS '93.

[3]  Yang Xiao,et al.  Secure Routing in AD HOC and Sensor Networks , 2007 .

[4]  Jan Camenisch,et al.  Anonymous yet accountable access control , 2005, WPES '05.

[5]  Mike A. Lockyer,et al.  A model of accountability, confidentiality and override for healthcare and other applications , 2000, RBAC '00.

[6]  Rajashekar Kailar Accountability in Electronic Commerce Protocols , 1996, IEEE Trans. Software Eng..

[7]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[8]  Ana Ferreira,et al.  Towards accountability for Electronic Patient Records , 2003, 16th IEEE Symposium Computer-Based Medical Systems, 2003. Proceedings..

[9]  Jim Geier Wireless Networks First-Step , 2004 .

[10]  Jerry den Hartog,et al.  An audit logic for accountability , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).

[11]  S. Bhattacharya,et al.  Accountability issues in multihop message communication , 1999, Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122).

[12]  Yang Xiao,et al.  Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.

[13]  Xu Su,et al.  Security Issues in Ad Hoc Networks , 2006 .

[14]  Jonathan Grudin,et al.  Trust and accountability: preserving human values in interactional experience , 1998, CHI Conference Summary.

[15]  Bala Srinivasan,et al.  Accountability logic for mobile payment protocols , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[16]  Andy C. Bavier,et al.  Decentralized trust management and accountability in federated systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[17]  Larry L. Peterson,et al.  PlanetFlow: maintaining accountability for network services , 2006, OPSR.

[18]  Mike Burmester,et al.  Security Issues in Ad-Hoc Networks , 2008 .

[19]  Helen Nissenbaum,et al.  Computing and accountability , 1994, CACM.

[20]  Brock N. Meeks Accountability through transparency;: life in 2050 , 2001, CACM.