Group based access control scheme

Proof of method for secure access control architecture in mobile ad-hoc networks

Asmidar Abu Bakar, Roslan Ismail, Abd Rahim Ahmad, Jamalul Lail Abdul Manan, Jamilin Jais

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working.

Original languageEnglish
Title of host publicationMoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia
Pages436-451
Number of pages16
DOIs
Publication statusPublished - 01 Dec 2009
Event7th International Conference on Advances in Mobile Computing and Multimedia, MoMM2009 - Kuala Lumpur, Malaysia
Duration: 14 Dec 200916 Dec 2009

Publication series

NameMoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia

Other

Other7th International Conference on Advances in Mobile Computing and Multimedia, MoMM2009
CountryMalaysia
CityKuala Lumpur
Period14/12/0916/12/09

Fingerprint

Mobile ad hoc networks
Access control
Disasters
Communication

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Graphics and Computer-Aided Design
  • Human-Computer Interaction
  • Software

Cite this

Abu Bakar, A., Ismail, R., Ahmad, A. R., Abdul Manan, J. L., & Jais, J. (2009). Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks. In MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia (pp. 436-451). (MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia). https://doi.org/10.1145/1821748.1821833
Abu Bakar, Asmidar ; Ismail, Roslan ; Ahmad, Abd Rahim ; Abdul Manan, Jamalul Lail ; Jais, Jamilin. / Group based access control scheme : Proof of method for secure access control architecture in mobile ad-hoc networks. MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia. 2009. pp. 436-451 (MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia).
@inproceedings{a2083f6ce91a415889b8b192175d5d86,
title = "Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks",
abstract = "In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working.",
author = "{Abu Bakar}, Asmidar and Roslan Ismail and Ahmad, {Abd Rahim} and {Abdul Manan}, {Jamalul Lail} and Jamilin Jais",
year = "2009",
month = "12",
day = "1",
doi = "10.1145/1821748.1821833",
language = "English",
isbn = "9781605586595",
series = "MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia",
pages = "436--451",
booktitle = "MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia",

}

Abu Bakar, A, Ismail, R, Ahmad, AR, Abdul Manan, JL & Jais, J 2009, Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks. in MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia. MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, pp. 436-451, 7th International Conference on Advances in Mobile Computing and Multimedia, MoMM2009, Kuala Lumpur, Malaysia, 14/12/09. https://doi.org/10.1145/1821748.1821833

Group based access control scheme : Proof of method for secure access control architecture in mobile ad-hoc networks. / Abu Bakar, Asmidar; Ismail, Roslan; Ahmad, Abd Rahim; Abdul Manan, Jamalul Lail; Jais, Jamilin.

MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia. 2009. p. 436-451 (MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Group based access control scheme

T2 - Proof of method for secure access control architecture in mobile ad-hoc networks

AU - Abu Bakar, Asmidar

AU - Ismail, Roslan

AU - Ahmad, Abd Rahim

AU - Abdul Manan, Jamalul Lail

AU - Jais, Jamilin

PY - 2009/12/1

Y1 - 2009/12/1

N2 - In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working.

AB - In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working.

UR - http://www.scopus.com/inward/record.url?scp=77955119259&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77955119259&partnerID=8YFLogxK

U2 - 10.1145/1821748.1821833

DO - 10.1145/1821748.1821833

M3 - Conference contribution

SN - 9781605586595

T3 - MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia

SP - 436

EP - 451

BT - MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia

ER -

Abu Bakar A, Ismail R, Ahmad AR, Abdul Manan JL, Jais J. Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks. In MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia. 2009. p. 436-451. (MoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia). https://doi.org/10.1145/1821748.1821833