Secure Access for MANET Using Authorization Enforcement Facility

被引:0
|
作者
Gowthami [1 ]
Sangeetha [1 ]
机构
[1] Kongu Engn Coll, Dept Comp Sci & Engn, Perundurai, India
关键词
Mobile Adhoc Networks; Risk Aware; Intrusion Detection System; Authorization Enforcement Facility; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As MANETs are highly vulnerable to attacks due to its dynamic infrastructure, there may occur several attacks. Among those attacks routing attack is the most severe one. To systematically cope up with this routing attack, Risk Aware Response Mechanism is used. In these mechanism IDS is used which detects malicious activities caused by malicious nodes, Based on the risk of attack, temporary decision is made whether isolation is needed or not. IDS used in risk aware response mechanism is static based approach. Hence rule set in IDS has to be updated often by the network administrator if there are any new emerging attacks. In this paper, we propose a Authorization Enforcement Facility which uses risk as an input to determine how much a source node can be trusted. AEF considers both static approach as well as dynamic conditions in order to achieve better security and allow only secure communication to takes place between source and destination.
引用
收藏
页码:212 / 216
页数:5
相关论文
共 50 条
  • [1] Secure authorization, access control and data integrity in Bluetooth
    Nguyen, L
    Safavi-Naini, R
    Susilo, W
    Wysocki, T
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON 2002), PROCEEDINGS, 2002, : 428 - 433
  • [2] SAFE - SECURE ACCESS FACILITY FOR THE ENTERPRISE
    BERGMANN, GJ
    [J]. COMPUTER, 1993, 26 (12) : 93 - 93
  • [3] Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing
    Krishnan, Ram
    Sandhu, Ravi
    [J]. INFORMATION SYSTEMS SECURITY, 2011, 7093 : 102 - 115
  • [4] Secure decision tree classification with decentralized authorization and access control
    Wang, Chen
    Xu, Jian
    Tan, Shanru
    Yin, Long
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [5] Authorization and access control to secure web services in a grid infrastructure
    Pastore, Serena
    [J]. WEBIST 2006: Proceedings of the Second International Conference on Web Information Systems and Technologies: INTERNET TECHNOLOGY / WEB INTERFACE AND APPLICATIONS, 2006, : 264 - 267
  • [6] Secure Authorization for Controlling Access via Key Management Scheme
    Hsiao, Tsung-Chih
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Xu, Fu-Sheng
    Tsui, Starlition
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [7] Secure Decision Tree Classification with Decentralized Authorization and Access Control
    Wang, Chen
    Xu, Jian
    Tan, Shanru
    Yin, Long
    [J]. 2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 105 - 112
  • [8] Authorization Enforcement Detection
    Porat, Ehood
    Tikochinski, Shmuel
    Stulman, Ariel
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 179 - 182
  • [9] Authorization in the digital library: Secure access to services across enterprise boundaries
    Ching, N
    Jones, V
    Winslett, M
    [J]. PROCEEDINGS OF THE THIRD FORUM ON RESEARCH AND TECHNOLOGY ADVANCES IN DIGITAL LIBRARIES (ADL '96), 1996, : 110 - 119
  • [10] Policy-based authentication and authorization: Secure access to the network infrastructure
    Hayes, J
    [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 328 - 333