An authentication mechanism for heterogeneous access control model in MANET emergency rescue mission

Elmunzir Hassan El Talib, A. Abu Bakar, Roslan Ismail
{"title":"An authentication mechanism for heterogeneous access control model in MANET emergency rescue mission","authors":"Elmunzir Hassan El Talib, A. Abu Bakar, Roslan Ismail","doi":"10.1109/ICIMU.2014.7066611","DOIUrl":null,"url":null,"abstract":"With the huge advancements of mobile computing due to the enormous increase in portable wireless devices, Mobile Ad hoc Networks (MANETs) became an important aspect in the world of wireless network communications. With some unique features such as scalability, fault tolerant and autonomous systems enable a network to be setup with or without any trusted authority. This makes MANET suitable for the emergency and rescue operations. During an emergency situation, there is a need for the data to be shared with the rescuers. Prior accessing the information in emergency services, nodes in MANET need to be authenticated. However due to wireless nature that MANET inherit, nodes are susceptible to attacks hence a secure authentication mechanism is required as authentication is the first defend mechanism. This paper review the authentication models in MANET and proposed the suitable model to work under our proposed access control model called Heterogeneous Access Control Model (HACM). HACM is an expanded proposed model from our Group Based Access Control Model (GBAC) where access to information is classified into general and sensitive based on the Group Role (GR) and User Role (UR) of rescue members during emergency services. The HACM model introduces Heterogeneous Access Level (HLA) where access to information is based on level of information sensitivity, which is mapped with user-role in the group, created at the emergency area. The level of information sensitivity depends on how disastrous or the severity of the emergency situation.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 6th International Conference on Information Technology and Multimedia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIMU.2014.7066611","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

With the huge advancements of mobile computing due to the enormous increase in portable wireless devices, Mobile Ad hoc Networks (MANETs) became an important aspect in the world of wireless network communications. With some unique features such as scalability, fault tolerant and autonomous systems enable a network to be setup with or without any trusted authority. This makes MANET suitable for the emergency and rescue operations. During an emergency situation, there is a need for the data to be shared with the rescuers. Prior accessing the information in emergency services, nodes in MANET need to be authenticated. However due to wireless nature that MANET inherit, nodes are susceptible to attacks hence a secure authentication mechanism is required as authentication is the first defend mechanism. This paper review the authentication models in MANET and proposed the suitable model to work under our proposed access control model called Heterogeneous Access Control Model (HACM). HACM is an expanded proposed model from our Group Based Access Control Model (GBAC) where access to information is classified into general and sensitive based on the Group Role (GR) and User Role (UR) of rescue members during emergency services. The HACM model introduces Heterogeneous Access Level (HLA) where access to information is based on level of information sensitivity, which is mapped with user-role in the group, created at the emergency area. The level of information sensitivity depends on how disastrous or the severity of the emergency situation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
MANET应急救援任务中异构访问控制模型的认证机制
随着便携式无线设备的大量增加,移动计算得到了巨大的进步,移动自组网(manet)成为无线网络通信领域的一个重要方面。通过一些独特的功能,如可伸缩性、容错和自治系统,可以在有或没有任何可信权威的情况下设置网络。这使得MANET适用于应急和救援行动。在紧急情况下,需要与救援人员共享数据。在访问应急服务中的信息之前,需要对MANET中的节点进行身份验证。然而,由于MANET继承的无线特性,节点容易受到攻击,因此需要一种安全的身份验证机制,因为身份验证是第一防御机制。本文对MANET中的认证模型进行了回顾,并提出了一种适合于我们提出的访问控制模型的模型——异构访问控制模型(HACM)。HACM是基于组的访问控制模型(GBAC)的扩展模型,该模型根据应急服务中救援成员的组角色(GR)和用户角色(UR)将信息访问分为一般访问和敏感访问。HACM模型引入了异构访问级别(HLA),其中对信息的访问基于信息敏感级别,该级别与在应急区域创建的组中的用户角色相映射。信息敏感程度取决于紧急情况的灾难性程度或严重程度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Copyright page Table of content (TOC) A data mining approach to analysing airborne wood particulate concentration and atmospheric data Mobile platform for exploring the potential of volunteered geographic information for asset register Web-based learning tool for primary school student with dyscalculia
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1