Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment

Mobile ad-hoc network is a network that can dynamically setup on the fly by mobile nodes. Due to its unique characteristics, it is becoming an attractive choice for commercial and also military application and among the used is to support information sharing among mobile nodes. However due to its borderless infrastructure, this network is highly susceptible to adversaries nodes, that illegally able to access information shared in the network. Hence to overcome this problem we proposed a Group Based Access Control scheme, a step by step process or protocol that able to make an access to share information in the network secure. We use emergency rescue mission scenario to illustrate the use of the scheme. The protocol created meets the security properties such as data confidentiality, integrity and also non-repudiation.

[1]  Antonio Corradi,et al.  Context-based access control for ubiquitous service provisioning , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..

[2]  Emil C. Lupu,et al.  PEACE : a policy-based establishment of ad-hoc communities , 2004, 20th Annual Computer Security Applications Conference.

[3]  Rainer Steffen,et al.  A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL , 2005 .

[4]  Morteza Amini,et al.  A Context-Aware Access Control Model for Pervasive Computing Environments , 2007 .

[5]  M.I. Aziz,et al.  Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.

[6]  Nigel P. Smart,et al.  Cryptography: An Introduction , 2004 .

[7]  Girish Katkar,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[8]  Carsten Griwodz,et al.  Middleware Services for Information Sharing in Mobile Ad-Hoc Networks - Challenges and Approach , 2004, Broadband Satellite Comunication Systems.

[9]  Jae-Kwang Lee,et al.  A Study of Defense DDoS Attacks Using IP Traceback , 2007 .

[10]  Guang Gong,et al.  Models of Authentications in Ad Hoc Networks and Their Related Network Properties , 2004 .

[11]  Ruixuan Li,et al.  Dynamic Role and Context-Based Access Control for Grid Applications , 2005, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05).

[12]  Öznur Özkasap,et al.  Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.

[13]  Sang-Uk Shin,et al.  Intelligent Access Control Mechanism for Ubiquitous Applications , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).

[14]  M. Parashar,et al.  Context-aware Dynamic Access Control for Pervasive Applications , 2004 .

[15]  Hong Fan,et al.  An Access Control Model for Ubiquitous Computing Application , 2005, 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems.