An Efficient Access Control Model for Mobile Ad-Hoc Communities View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2005

AUTHORS

Sye Loong Keoh , Emil Lupu

ABSTRACT

Mobile ad-hoc networks support interactions and collaborations among autonomous devices by enabling users to share resources and provide services to each other, whether collaborations are for business or leisure purposes. It is therefore important to ensure that interactions are subject to authentication and access control in order to restrict access to only those resources and services that the user intends to share. Existing access control models that are based on membership certificates incur redundant verifications and therefore require significant computation. They are inefficient because devices have to repeatedly verify the requestor’s certificates and check the authorisation policies for each service access request received. In this paper, we present an efficient access control model that combines a membership list with the role-based access control (RBAC) model. Each ad-hoc network has a coordinator that is responsible for maintaining the membership and broadcasting a signed membership list to all participants at regular intervals. The model authorises a service request if the requestor is listed in the membership list and its assigned role is authorised to perform the requested actions. Through experiments, we have observed the efficiency gains obtained through use of this model. More... »

PAGES

210-224

Book

TITLE

Security in Pervasive Computing

ISBN

978-3-540-25521-5
978-3-540-32004-3

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-32004-3_21

DOI

http://dx.doi.org/10.1007/978-3-540-32004-3_21

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1023348468


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College, 180, Queen\u2019s Gate, SW7 2AZ, London", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College, 180, Queen\u2019s Gate, SW7 2AZ, London"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Keoh", 
        "givenName": "Sye Loong", 
        "id": "sg:person.014542541003.00", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014542541003.00"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College, 180, Queen\u2019s Gate, SW7 2AZ, London", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College, 180, Queen\u2019s Gate, SW7 2AZ, London"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lupu", 
        "givenName": "Emil", 
        "id": "sg:person.013404167044.28", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404167044.28"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2005", 
    "datePublishedReg": "2005-01-01", 
    "description": "Mobile ad-hoc networks support interactions and collaborations among autonomous devices by enabling users to share resources and provide services to each other, whether collaborations are for business or leisure purposes. It is therefore important to ensure that interactions are subject to authentication and access control in order to restrict access to only those resources and services that the user intends to share. Existing access control models that are based on membership certificates incur redundant verifications and therefore require significant computation. They are inefficient because devices have to repeatedly verify the requestor\u2019s certificates and check the authorisation policies for each service access request received. In this paper, we present an efficient access control model that combines a membership list with the role-based access control (RBAC) model. Each ad-hoc network has a coordinator that is responsible for maintaining the membership and broadcasting a signed membership list to all participants at regular intervals. The model authorises a service request if the requestor is listed in the membership list and its assigned role is authorised to perform the requested actions. Through experiments, we have observed the efficiency gains obtained through use of this model.", 
    "editor": [
      {
        "familyName": "Hutter", 
        "givenName": "Dieter", 
        "type": "Person"
      }, 
      {
        "familyName": "Ullmann", 
        "givenName": "Markus", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-32004-3_21", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-25521-5", 
        "978-3-540-32004-3"
      ], 
      "name": "Security in Pervasive Computing", 
      "type": "Book"
    }, 
    "keywords": [
      "access control model", 
      "efficient access control model", 
      "role-based access control model", 
      "control model", 
      "service access requests", 
      "Mobile Ad", 
      "access control", 
      "service requests", 
      "access requests", 
      "redundant verification", 
      "significant computation", 
      "authorisation policies", 
      "autonomous devices", 
      "membership certificate", 
      "users", 
      "network", 
      "requests", 
      "AD", 
      "services", 
      "authentication", 
      "requestor", 
      "certificates", 
      "resources", 
      "collaboration", 
      "efficiency gains", 
      "leisure purposes", 
      "computation", 
      "verification", 
      "devices", 
      "model", 
      "list", 
      "business", 
      "access", 
      "coordinator", 
      "membership list", 
      "order", 
      "experiments", 
      "use", 
      "community", 
      "membership", 
      "purpose", 
      "interaction", 
      "regular intervals", 
      "gain", 
      "policy", 
      "control", 
      "paper", 
      "action", 
      "participants", 
      "interval", 
      "role"
    ], 
    "name": "An Efficient Access Control Model for Mobile Ad-Hoc Communities", 
    "pagination": "210-224", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1023348468"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-32004-3_21"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-32004-3_21", 
      "https://app.dimensions.ai/details/publication/pub.1023348468"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-09-02T16:16", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220902/entities/gbq_results/chapter/chapter_440.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-32004-3_21"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-32004-3_21'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-32004-3_21'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-32004-3_21'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-32004-3_21'


 

This table displays all metadata directly associated to this object as RDF triples.

122 TRIPLES      22 PREDICATES      76 URIs      69 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-32004-3_21 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N5373ea97c868477a892ab8ffddaab113
4 schema:datePublished 2005
5 schema:datePublishedReg 2005-01-01
6 schema:description Mobile ad-hoc networks support interactions and collaborations among autonomous devices by enabling users to share resources and provide services to each other, whether collaborations are for business or leisure purposes. It is therefore important to ensure that interactions are subject to authentication and access control in order to restrict access to only those resources and services that the user intends to share. Existing access control models that are based on membership certificates incur redundant verifications and therefore require significant computation. They are inefficient because devices have to repeatedly verify the requestor’s certificates and check the authorisation policies for each service access request received. In this paper, we present an efficient access control model that combines a membership list with the role-based access control (RBAC) model. Each ad-hoc network has a coordinator that is responsible for maintaining the membership and broadcasting a signed membership list to all participants at regular intervals. The model authorises a service request if the requestor is listed in the membership list and its assigned role is authorised to perform the requested actions. Through experiments, we have observed the efficiency gains obtained through use of this model.
7 schema:editor N85ccd37fc1fb4bceb566612e3a868521
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf Na121b7eeb38240f2a9c3ffec0e469fcb
11 schema:keywords AD
12 Mobile Ad
13 access
14 access control
15 access control model
16 access requests
17 action
18 authentication
19 authorisation policies
20 autonomous devices
21 business
22 certificates
23 collaboration
24 community
25 computation
26 control
27 control model
28 coordinator
29 devices
30 efficiency gains
31 efficient access control model
32 experiments
33 gain
34 interaction
35 interval
36 leisure purposes
37 list
38 membership
39 membership certificate
40 membership list
41 model
42 network
43 order
44 paper
45 participants
46 policy
47 purpose
48 redundant verification
49 regular intervals
50 requestor
51 requests
52 resources
53 role
54 role-based access control model
55 service access requests
56 service requests
57 services
58 significant computation
59 use
60 users
61 verification
62 schema:name An Efficient Access Control Model for Mobile Ad-Hoc Communities
63 schema:pagination 210-224
64 schema:productId Na68caf25e98f4e74a14d492330384a3f
65 Ndf10d4192cea4f76b24807eb36ac1480
66 schema:publisher N11500847dbd54d24b18ae2588b6a3495
67 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023348468
68 https://doi.org/10.1007/978-3-540-32004-3_21
69 schema:sdDatePublished 2022-09-02T16:16
70 schema:sdLicense https://scigraph.springernature.com/explorer/license/
71 schema:sdPublisher N2676fff13a5c44d5ae36c40473a0b925
72 schema:url https://doi.org/10.1007/978-3-540-32004-3_21
73 sgo:license sg:explorer/license/
74 sgo:sdDataset chapters
75 rdf:type schema:Chapter
76 N11500847dbd54d24b18ae2588b6a3495 schema:name Springer Nature
77 rdf:type schema:Organisation
78 N2676fff13a5c44d5ae36c40473a0b925 schema:name Springer Nature - SN SciGraph project
79 rdf:type schema:Organization
80 N4faa800adb3245c3a2b8c2f2d7fa67c4 schema:familyName Ullmann
81 schema:givenName Markus
82 rdf:type schema:Person
83 N5373ea97c868477a892ab8ffddaab113 rdf:first sg:person.014542541003.00
84 rdf:rest N7f3405abe51142feaf3fe8fc81c7bce2
85 N690dc618890b45af8519c603ef58ce80 rdf:first N4faa800adb3245c3a2b8c2f2d7fa67c4
86 rdf:rest rdf:nil
87 N7f3405abe51142feaf3fe8fc81c7bce2 rdf:first sg:person.013404167044.28
88 rdf:rest rdf:nil
89 N85ccd37fc1fb4bceb566612e3a868521 rdf:first Nf4c06ba2bb884cc99ee3bc20de000fee
90 rdf:rest N690dc618890b45af8519c603ef58ce80
91 Na121b7eeb38240f2a9c3ffec0e469fcb schema:isbn 978-3-540-25521-5
92 978-3-540-32004-3
93 schema:name Security in Pervasive Computing
94 rdf:type schema:Book
95 Na68caf25e98f4e74a14d492330384a3f schema:name dimensions_id
96 schema:value pub.1023348468
97 rdf:type schema:PropertyValue
98 Ndf10d4192cea4f76b24807eb36ac1480 schema:name doi
99 schema:value 10.1007/978-3-540-32004-3_21
100 rdf:type schema:PropertyValue
101 Nf4c06ba2bb884cc99ee3bc20de000fee schema:familyName Hutter
102 schema:givenName Dieter
103 rdf:type schema:Person
104 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
105 schema:name Information and Computing Sciences
106 rdf:type schema:DefinedTerm
107 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
108 schema:name Information Systems
109 rdf:type schema:DefinedTerm
110 sg:person.013404167044.28 schema:affiliation grid-institutes:grid.7445.2
111 schema:familyName Lupu
112 schema:givenName Emil
113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404167044.28
114 rdf:type schema:Person
115 sg:person.014542541003.00 schema:affiliation grid-institutes:grid.7445.2
116 schema:familyName Keoh
117 schema:givenName Sye Loong
118 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014542541003.00
119 rdf:type schema:Person
120 grid-institutes:grid.7445.2 schema:alternateName Department of Computing, Imperial College, 180, Queen’s Gate, SW7 2AZ, London
121 schema:name Department of Computing, Imperial College, 180, Queen’s Gate, SW7 2AZ, London
122 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...