An Ownership Model and a Security Policy Definition Language to Security Bootstrap Ad-hoc Distributed Systems
نویسنده
چکیده
We believe that the critical aspect in providing security for pervasive environments is building security and trust relations between devices without requiring the users to be experts. In this tech-note we present two complementary mechanisms to bootstrap security relations between networked devices: the ownership model and a security policy definition language. The ownership model assures security relations between devices owned by the same user, and the security policy language defines security relations to other devices, assigns rights to relations, and supports authentic key exchange.
منابع مشابه
Building Secure Communities in Spontaneously Networked Environments
We believe that the critical aspect in providing security for pervasive environments is building security and trust relations between devices without requiring the users to be experts. In this tech-note we present two complementary mechanisms to bootstrap security relations between networked devices: the ownership model and a security policy definition language. The ownership model assures secu...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملReliable and fully distributed trust model for mobile ad hoc networks
Amobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in MANETs is compulsory to guarantee a wide spread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. Our w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004