Secure and distributed knowledge management in pervasive environments

Pervasive environments are mostly based on the ad hoc networking paradigm and are characterized by ubiquity in both users and devices and artefacts. In these inherently unstable conditions and bearing in mind the resources limitations that are attributed to participating devices, the deployment of knowledge management techniques is considered complicated due to the particular requirements. This paper addresses the issue of secure and distributed knowledge management applications in pervasive environments. We present a prototype implementation after having presented detailed design principles as far as the communications and the application itself is regarded. Robustness and lightweight implementation are the cornerstones of the proposed solution.

[1]  S. Chakrabarti,et al.  QoS issues in ad hoc wireless networks , 2001, IEEE Commun. Mag..

[2]  Vijay Varadharajan,et al.  Tower: A Language for Role Based Access Control , 2001, POLICY.

[3]  Charles E. Perkins,et al.  Guest editorial wireless ad hoc networks , 1999, IEEE J. Sel. Areas Commun..

[4]  I. Nonaka A Dynamic Theory of Organizational Knowledge Creation , 1994 .

[5]  S. Hailes,et al.  ADAM: An Agent-based Middleware Architecture for Distributed Access Control , 2004 .

[6]  Roy Friedman,et al.  Locating cache proxies in manets , 2004, MobiHoc '04.

[7]  Leandros Tassiulas,et al.  Network layer support for service discovery in mobile ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[8]  Elisa Bertino,et al.  Access-control language for multidomain environments , 2004, IEEE Internet Computing.

[9]  H. Shimazu,et al.  Ubiquitous knowledge management - enabling an office-work scheduling tool for corporate knowledge sharing , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.

[10]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[11]  Silvia Giordano,et al.  Mobile ad hoc networks , 2002 .

[12]  Ivan Stojmenovic,et al.  Ad hoc Networking , 2004 .

[13]  Roland Awischus,et al.  Role based access control with the security administration manager (SAM) , 1997, RBAC '97.

[14]  Prathima Agrawal,et al.  Minimizing cellular handover failures without channel utilization loss , 1994, 1994 IEEE GLOBECOM. Communications: The Global Bridge.

[15]  Peng-Jun Wan,et al.  Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[16]  Per Gunningberg,et al.  Lessons from experimental MANET research , 2005, Ad Hoc Networks.

[17]  Steffen Staab,et al.  XAROP: A Midterm Report in Introducing a Decentralized Semantics-Based Knowledge Sharing Application , 2004, PAKM.

[18]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[19]  Keith W. Hipel,et al.  Guest Editorial , 2003, IEEE Trans. Syst. Man Cybern. Part C.

[20]  Joseph P. Macker,et al.  Internet-Based Mobile Ad Hoc Networking , 1999, IEEE Internet Comput..

[21]  John S. Baras,et al.  Towards automated negotiation of access control policies , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[22]  Sung-Ju Lee,et al.  Mobility prediction and routing in ad hoc wireless networks , 2001, Int. J. Netw. Manag..

[23]  J.-Y. Le Boudec,et al.  Toward self-organized mobile ad hoc networks: the terminodes project , 2001, IEEE Commun. Mag..

[24]  Prathima Agrawal,et al.  Optimal prioritization of handovers in mobile cellular networks , 1994, 5th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Wireless Networks - Catching the Mobile Future..

[25]  Marco Conti,et al.  Ad hoc networking for pervasive systems , 2005, Ad Hoc Networks.

[26]  Yongguang Zhang,et al.  An integrated environment for testing mobile ad-hoc networks , 2002, MobiHoc '02.