Reliable Security Policy in Mobile Distributed Network

被引:0
|
作者
Suganthi, Bhuvana D. [1 ]
Manjuath, R. [1 ]
Aravindan, A.
机构
[1] AMC Engn Coll, Bangalore, Karnataka, India
关键词
Mobile Distributed Networks; Access Control Policy; Cumulative Reputation Value; Security; Mobile Distributed Systems; Agreement routing Algorithm;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this proposed paper, trusted policy based routing algorithm(TSPRA) is implemented for high security in Mobile Distributed Networks due to unreliability in storing the data and provides the solution to the problems of traditional authorization techniques. Here, Every Mobile Host (MH) has an Access Control Policy (ACP) with any specific combination of permissions. Based on the number of attempts made by the mobile hosts, the respective Mobile Agent (MA) will have a direct interaction with other MH, which produces the table about recommendations from MA's. Then a cumulative reputation value (CRV) is assigned to each MH. The ACP of a MH is then updated based on the estimated CRV. The MHs having highest CRV can be granted full access control whereas the MHs having least CRV can be granted the least access control. Then the consensus routing algorithm [1] is applied. The nodes with better availability function and CRV are selected as routers for forwarding the data. The simulation results obtained better security by reducing the packet drops and storage overhead.
引用
收藏
页码:1782 / 1786
页数:5
相关论文
共 50 条
  • [1] A Firewall Policy Anomaly Detection Framework for Reliable Network Security
    Togay, Cengiz
    Kasif, Ahmet
    Catal, Cagatay
    Tekinerdogan, Bedir
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2022, 71 (01) : 339 - 347
  • [2] Analysis of policy anomalies on distributed network security setups
    Alfaro, J. G.
    Cuppens, F.
    Cuppens-Boulahia, N.
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 496 - 511
  • [3] MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy
    Anjum, Iffat
    Sokal, Jessica
    Rehman, Hafiza Ramzah
    Weintraub, Ben
    Leba, Ethan
    Enck, William
    Nita-Rotaru, Cristina
    Reaves, Bradley
    [J]. PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, : 121 - 132
  • [4] SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes
    Thomasset, Corentin
    Barrera, David
    [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 542 - 555
  • [5] Reliable process for security policy deployment
    Preda, Stere
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Alfaro, Joaquin G.
    Toutain, Laurent
    [J]. SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 5 - +
  • [6] Distributed security policy conformance
    Montanari, Mirko
    Chan, Ellick
    Larson, Kevin
    Yoo, Wucherl
    Campbell, Roy H.
    [J]. COMPUTERS & SECURITY, 2013, 33 : 28 - 40
  • [7] Distributed Security Policy Conformance
    Montanari, Mirko
    Chan, Ellick
    Larson, Kevin
    Yoo, Wucherl
    Campbell, Roy H.
    [J]. FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 210 - 222
  • [8] Network security: distributed intrusion detection system using mobile agent technology
    Boukhlouf, Djemaa
    Kazar, Okba
    Kahloul, Laid
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2016, 17 (04) : 335 - 347
  • [9] Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks
    Alicherry, Mansoor
    Keromytis, Angelos D.
    Stavrou, Angelos
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2009, 19 : 41 - +
  • [10] Security policy for deducting unauthorized IP based mobile host inside the network
    Sanjeevi, V. K.
    Veluchandhar, K.
    Sakthivel, S.
    Supriya, M.
    [J]. ELECTRONICS AND COMMUNICATIONS: PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON ELECTRONICS, HARDWARE, WIRELESS AND OPTICAL COMMUNICATIONS (EHAC '08), 2008, : 177 - +