Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks

In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster ar...

Full description

Saved in:
Bibliographic Details
Main Authors: Bakar A.A., Ismail R., Ahmad A.R., Abdul Manan J.-L., Jais J.
Other Authors: 35178991300
Format: Conference paper
Published: 2023
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1833350703925428224
author Bakar A.A.
Ismail R.
Ahmad A.R.
Abdul Manan J.-L.
Jais J.
author2 35178991300
author_facet 35178991300
Bakar A.A.
Ismail R.
Ahmad A.R.
Abdul Manan J.-L.
Jais J.
author_sort Bakar A.A.
building UNITEN Library
collection Institutional Repository
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
continent Asia
country Malaysia
description In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working. Copyright 2009 ACM.
format Conference paper
id my.uniten.dspace-30761
institution Universiti Tenaga Nasional
publishDate 2023
record_format dspace
spelling my.uniten.dspace-307612023-12-29T15:52:46Z Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks Bakar A.A. Ismail R. Ahmad A.R. Abdul Manan J.-L. Jais J. 35178991300 15839357700 35589598800 36026786500 57212154525 Access control ERM Information sharing MANET Ad hoc networks Information dissemination Information retrieval Mobile ad hoc networks Mobile telecommunication systems Security systems Telecommunication networks Access control architecture Access control schemes Ad hoc environment Disaster areas Emergency rescue ERM Group-based Information need Information sharing Malicious nodes Proposed architectures Rescue missions Access control In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working. Copyright 2009 ACM. Final 2023-12-29T07:52:45Z 2023-12-29T07:52:45Z 2009 Conference paper 10.1145/1821748.1821833 2-s2.0-77955119259 https://www.scopus.com/inward/record.uri?eid=2-s2.0-77955119259&doi=10.1145%2f1821748.1821833&partnerID=40&md5=cf525872516e695abb57bdabc549d616 https://irepository.uniten.edu.my/handle/123456789/30761 436 451 Scopus
spellingShingle Access control
ERM
Information sharing
MANET
Ad hoc networks
Information dissemination
Information retrieval
Mobile ad hoc networks
Mobile telecommunication systems
Security systems
Telecommunication networks
Access control architecture
Access control schemes
Ad hoc environment
Disaster areas
Emergency rescue
ERM
Group-based
Information need
Information sharing
Malicious nodes
Proposed architectures
Rescue missions
Access control
Bakar A.A.
Ismail R.
Ahmad A.R.
Abdul Manan J.-L.
Jais J.
Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
title Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
title_full Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
title_fullStr Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
title_full_unstemmed Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
title_short Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
title_sort group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks
topic Access control
ERM
Information sharing
MANET
Ad hoc networks
Information dissemination
Information retrieval
Mobile ad hoc networks
Mobile telecommunication systems
Security systems
Telecommunication networks
Access control architecture
Access control schemes
Ad hoc environment
Disaster areas
Emergency rescue
ERM
Group-based
Information need
Information sharing
Malicious nodes
Proposed architectures
Rescue missions
Access control
url_provider http://dspace.uniten.edu.my/