Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks

Asmidar Abu Bakar, Roslan Ismail, Abdul Rahim Ahmad, Jamalul Lail Abdul Manan, Jamilin Jais

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working.

Original languageEnglish
Title of host publicationMoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia
Pages436-451
Number of pages16
DOIs
Publication statusPublished - 01 Dec 2009
Event7th International Conference on Advances in Mobile Computing and Multimedia, MoMM2009 - Kuala Lumpur, Malaysia
Duration: 14 Dec 200916 Dec 2009

Publication series

NameMoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia

Other

Other7th International Conference on Advances in Mobile Computing and Multimedia, MoMM2009
CountryMalaysia
CityKuala Lumpur
Period14/12/0916/12/09

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Graphics and Computer-Aided Design
  • Human-Computer Interaction
  • Software

Fingerprint Dive into the research topics of 'Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks'. Together they form a unique fingerprint.

  • Cite this

    Bakar, A. A., Ismail, R., Ahmad, A. R., Abdul Manan, J. L., & Jais, J. (2009). Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks. In MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia (pp. 436-451). (MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia). https://doi.org/10.1145/1821748.1821833