Access control in ad hoc groups

被引:9
|
作者
Saxena, N [1 ]
Tsudik, G [1 ]
Yi, JH [1 ]
机构
[1] Univ Calif Irvine, Sch Informat & Comp Sci, Irvine, CA 92697 USA
关键词
D O I
10.1109/PTPSYS.2004.2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolerant computing and communication. Since such groups do not require any pre-deployed infrastructure or any trusted centralized authority they have many valuable applications in military and commercial settings as well as in emergency and rescue operations. However, due to lack of centralized control, ad hoc groups are inherently insecure and vulnerable to attacks from both within and outside the group. Decentralized access control is the fundamental security service for ad hoc groups. It is needed not only to prevent unauthorized nodes from becoming members but also to bootstrap other security services such as key management. In this paper we survey a number of practical distributed access control mechanisms based on various flavors of threshold signatures.
引用
收藏
页码:2 / 7
页数:6
相关论文
共 50 条
  • [41] Using semantic policies for ad-hoc coalition access control
    Dersingh, Anand
    Liscano, Ramiro
    Jost, Allan
    2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 297 - 304
  • [42] A media access control scheme for service differentiation in ad hoc networks
    Yang, Yan-Bin
    Guo, Hui-Qing
    Journal of Donghua University (English Edition), 2010, 27 (05) : 681 - 686
  • [43] Issues in ad hoc networks: Scaling laws, media access control, and power control
    Kumar, PR
    MODELING AND DESIGN OF WIRELESS NETWORKS, 2001, 4531 : 14 - 21
  • [44] Joint congestion control and media access control design for ad hoc wireless networks
    Chen, LJ
    Low, SH
    Doyle, JC
    IEEE Infocom 2005: The Conference on Computer Communications, Vols 1-4, Proceedings, 2005, : 2212 - 2222
  • [45] Bi-code channel access with robust medium access control for ad hoc networking
    Prokkola, J
    Bräysy, T
    MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 996 - 1002
  • [46] Anonymous identification in Ad hoc groups
    Dodis, Y
    Kiayias, A
    Nicolosi, A
    Shoup, V
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 609 - 626
  • [47] Ad hoc security associations for groups
    Valkonen, Jukka
    Asokan, N.
    Nyberg, Kaisa
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2006, 4357 : 150 - +
  • [48] A power efficient media access control (PEMAC) protocol for Ad hoc networks
    Yu, Xutao
    Zhang, Zaichen
    Bi, Guangguo
    GLOBAL MOBILE CONGRESS 2005, 2005, : 277 - 282
  • [49] A Distributed Medium Access Control Protocol for Cognitive Radio Ad Hoc Networks
    Joshi, Gyanendra Prasad
    Kim, Sung Won
    Kim, Changsu
    Nam, Seung Yeob
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (01): : 331 - 343
  • [50] Intelligent security auditing based on access control of devices in Ad Hoc network
    Department of Computer Science and Technology, Donghua University, Shanghai 201620, China
    不详
    J. Donghua Univ., 2006, 6 (50-52):