Implementation and evaluation of accountability using flow-net in wireless networks

In order to provide accountability, a better logging system is needed so that not only the activities but also their relationships are captured. To this end, our previous work proposed a novel logging mechanism, flow-net methodology, for accountability. In this paper, we extend the flow-net methodology and present its design and implementation in wireless networks. We also evaluate the performance of flow-net and compare it to that of audit log files.

[1]  Geoffrey Smith,et al.  Secure information flow in a multi-threaded imperative language , 1998, POPL '98.

[2]  Pamela Samuelson Digital Rights Management {and, or, vs.} the Law , 2003 .

[3]  Ali Movaghar-Rahimabadi,et al.  Anonymous authentication protocol for GSM networks , 2008, Int. J. Secur. Networks.

[4]  Sukumar Nandi,et al.  Secure user-identification and key distribution scheme preserving anonymity , 2008, Int. J. Secur. Networks.

[5]  Pamela Samuelson,et al.  DRM {and, or, vs.} the law , 2003, CACM.

[6]  Mooi Choo Chuah,et al.  Syntax vs. semantics: competing approaches to dynamic network intrusion detection , 2008, Int. J. Secur. Networks.

[7]  Guang Gong,et al.  Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks , 2007, Int. J. Secur. Networks.

[8]  Daisuke Takahashi,et al.  Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability , 2008, 2008 IEEE International Conference on Communications.

[9]  Sujeet Shenoi,et al.  Forensic analysis of SCADA systems and networks , 2008, Int. J. Secur. Networks.

[10]  Pin-Han Ho,et al.  A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks , 2008, Int. J. Secur. Networks.

[11]  Constantinos E. Goutis,et al.  Server side hashing core exceeding 3 Gbps of throughput , 2007, Int. J. Secur. Networks.

[12]  Xiaoqi Ma,et al.  Verifying security protocols by knowledge analysis , 2008, Int. J. Secur. Networks.

[13]  Victor C. M. Leung,et al.  Enhancing security using mobility-based anomaly detection in cellular mobile networks , 2006, IEEE Trans. Veh. Technol..

[14]  Sencun Zhu,et al.  LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network , 2007, Int. J. Secur. Networks.

[15]  Barry E. Mullins,et al.  Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks , 2007, Int. J. Secur. Networks.

[16]  Indrajit Ray,et al.  Origins: an approach to trace fast spreading worms to their roots , 2008, Int. J. Secur. Networks.

[17]  Micah Sherr,et al.  On the (un)reliability of eavesdropping , 2008, Int. J. Secur. Networks.

[18]  Yang Xiao Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.

[19]  Arnold L. Rosenberg Accountable Web-computing , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[20]  Andrew W. Appel,et al.  SAFKASI: a security mechanism for language-based systems , 2000, TSEM.

[21]  Indrajit Ray,et al.  Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents , 2008, Int. J. Secur. Networks.

[22]  Liqun Chen,et al.  On security proof of McCullagh?Barreto's key agreement protocol and its variants , 2007, Int. J. Secur. Networks.

[23]  Johnny S. Wong,et al.  An agent-based framework for intrusion detection alert verification and event correlation , 2008, Int. J. Secur. Networks.

[24]  Adel Bouhoula,et al.  Firewall filtering rules analysis for anomalies detection , 2008, Int. J. Secur. Networks.

[25]  Robert F. Mills,et al.  Using PLSI-U to detect insider threats by datamining e-mail , 2008, Int. J. Secur. Networks.

[26]  Deirdre K. Mulligan,et al.  Implementing Copyright Limitations in Rights Expression Languages , 2002, Digital Rights Management Workshop.

[27]  Yang Xiao Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.

[28]  Panayiotis Kotzanikolaou,et al.  Multilayer key establishment for large-scale sensor networks , 2008, Int. J. Secur. Networks.

[29]  J. Morse,et al.  Verification Strategies for Establishing Reliability and Validity in Qualitative Research , 2002 .

[30]  Yacine Challal,et al.  Adaptive clustering for scalable key management in dynamic group communications , 2008, Int. J. Secur. Networks.

[31]  Fei Hu,et al.  Towards a realistic testbed for wireless network reliability and security performance studies , 2008, Int. J. Secur. Networks.

[32]  Rajashekar Kailar,et al.  Accountability in Electronic Commerce Protocols , 1996, IEEE Trans. Software Eng..

[33]  Xukai Zou,et al.  A novel Conference Key Management solution for Secure Dynamic Conferencing , 2008, Int. J. Secur. Networks.

[34]  Bharat K. Bhargava,et al.  Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .

[35]  Huaxiong Wang,et al.  Efficient multicast stream authentication for the fully adversarial network model , 2007, Int. J. Secur. Networks.

[36]  Haiping Xu,et al.  Formal modelling and analysis of XML firewall for service-oriented systems , 2008, Int. J. Secur. Networks.

[37]  Yang Xiao,et al.  Building a wireless capturing tool for WiFi , 2009, Secur. Commun. Networks.

[38]  Jie Wu,et al.  PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks , 2008, Int. J. Secur. Networks.

[39]  Bodo Möller,et al.  Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol , 2007, Int. J. Secur. Networks.

[40]  Renato J. O. Figueiredo,et al.  Fine-grain access control for securing shared resources in computational grids , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[41]  Ricardo Dahab,et al.  On the design of secure protocols for hierarchical sensor networks , 2007, Int. J. Secur. Networks.

[42]  Supakorn Kungpisdan,et al.  Practical Reasoning about Accountability in Electronic Commerce Protocols , 2001, ICISC.

[43]  Paul Helman,et al.  Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse , 1993, IEEE Trans. Software Eng..

[44]  Javier Herranz,et al.  Aggregate designated verifier signatures and application to secure routing , 2007, Int. J. Secur. Networks.

[45]  Dijiang Huang Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks , 2007, Int. J. Secur. Networks.

[46]  Fagen Li,et al.  ID-based threshold proxy signcryption scheme from bilinear pairings , 2008, Int. J. Secur. Networks.