Risk Based Authorisation for Mobile Ad Hoc Networks View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2007-01-01

AUTHORS

Nilufer Tuptuk , Emil Lupu

ABSTRACT

Mobile ad hoc networks (MANETs) do not share the properties of traditional wired networks, as mobile nodes are more vulnerable to security attacks. Detection of selfish, malicious or faulty nodes presents security challenges that are not encountered traditionally in wired networks. The nodes in the network need to identify, and take the necessary security measures to protect their resources against these malicious nodes. We propose a risk-based authorisation model to help build ad-hoc trust relationships, capturing the dynamic behaviour of the entities with time, and ensuring the sharing of trust information through recommendations. More... »

PAGES

188-191

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-72986-0_22

DOI

http://dx.doi.org/10.1007/978-3-540-72986-0_22

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1004626527


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College, 180 Queen\u2019s Gate, London SW7 2AZ, UK", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College, 180 Queen\u2019s Gate, London SW7 2AZ, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tuptuk", 
        "givenName": "Nilufer", 
        "id": "sg:person.07711264603.69", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07711264603.69"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College, 180 Queen\u2019s Gate, London SW7 2AZ, UK", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College, 180 Queen\u2019s Gate, London SW7 2AZ, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lupu", 
        "givenName": "Emil", 
        "id": "sg:person.013404167044.28", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404167044.28"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2007-01-01", 
    "datePublishedReg": "2007-01-01", 
    "description": "Mobile ad hoc networks (MANETs) do not share the properties of traditional wired networks, as mobile nodes are more vulnerable to security attacks. Detection of selfish, malicious or faulty nodes presents security challenges that are not encountered traditionally in wired networks. The nodes in the network need to identify, and take the necessary security measures to protect their resources against these malicious nodes. We propose a risk-based authorisation model to help build ad-hoc trust relationships, capturing the dynamic behaviour of the entities with time, and ensuring the sharing of trust information through recommendations.", 
    "editor": [
      {
        "familyName": "Bandara", 
        "givenName": "Arosha K.", 
        "type": "Person"
      }, 
      {
        "familyName": "Burgess", 
        "givenName": "Mark", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-72986-0_22", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-72985-3", 
        "978-3-540-72986-0"
      ], 
      "name": "Inter-Domain Management", 
      "type": "Book"
    }, 
    "keywords": [
      "Mobile Ad Hoc Networks", 
      "traditional wired networks", 
      "Ad Hoc Networks", 
      "necessary security measures", 
      "security attacks", 
      "trust information", 
      "malicious nodes", 
      "Mobile Ad", 
      "authorisation model", 
      "mobile nodes", 
      "wired networks", 
      "Hoc Networks", 
      "trust relationships", 
      "security challenges", 
      "security measures", 
      "faulty nodes", 
      "network", 
      "nodes", 
      "AD", 
      "sharing", 
      "attacks", 
      "information", 
      "resources", 
      "dynamic behavior", 
      "detection", 
      "challenges", 
      "entities", 
      "authorisation", 
      "model", 
      "recommendations", 
      "time", 
      "measures", 
      "behavior", 
      "relationship", 
      "properties"
    ], 
    "name": "Risk Based Authorisation for Mobile Ad Hoc Networks", 
    "pagination": "188-191", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1004626527"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-72986-0_22"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-72986-0_22", 
      "https://app.dimensions.ai/details/publication/pub.1004626527"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-09-02T16:18", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220902/entities/gbq_results/chapter/chapter_92.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-72986-0_22"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-72986-0_22'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-72986-0_22'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-72986-0_22'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-72986-0_22'


 

This table displays all metadata directly associated to this object as RDF triples.

118 TRIPLES      22 PREDICATES      62 URIs      52 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-72986-0_22 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 anzsrc-for:0806
4 anzsrc-for:10
5 anzsrc-for:1005
6 schema:author Na8f5490f6e454932995229246ac79ca0
7 schema:datePublished 2007-01-01
8 schema:datePublishedReg 2007-01-01
9 schema:description Mobile ad hoc networks (MANETs) do not share the properties of traditional wired networks, as mobile nodes are more vulnerable to security attacks. Detection of selfish, malicious or faulty nodes presents security challenges that are not encountered traditionally in wired networks. The nodes in the network need to identify, and take the necessary security measures to protect their resources against these malicious nodes. We propose a risk-based authorisation model to help build ad-hoc trust relationships, capturing the dynamic behaviour of the entities with time, and ensuring the sharing of trust information through recommendations.
10 schema:editor Nda14cdb784444e18b2745d9f20848616
11 schema:genre chapter
12 schema:isAccessibleForFree false
13 schema:isPartOf Nd5316b53738f4d599dcfdfb5ec9b944a
14 schema:keywords AD
15 Ad Hoc Networks
16 Hoc Networks
17 Mobile Ad
18 Mobile Ad Hoc Networks
19 attacks
20 authorisation
21 authorisation model
22 behavior
23 challenges
24 detection
25 dynamic behavior
26 entities
27 faulty nodes
28 information
29 malicious nodes
30 measures
31 mobile nodes
32 model
33 necessary security measures
34 network
35 nodes
36 properties
37 recommendations
38 relationship
39 resources
40 security attacks
41 security challenges
42 security measures
43 sharing
44 time
45 traditional wired networks
46 trust information
47 trust relationships
48 wired networks
49 schema:name Risk Based Authorisation for Mobile Ad Hoc Networks
50 schema:pagination 188-191
51 schema:productId N589b1d943cee4a8c80f9036ec73dddc8
52 N9345db9856e34d3fa44b796398181c77
53 schema:publisher N4fa80261ae4c42eab67054dba19942ef
54 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004626527
55 https://doi.org/10.1007/978-3-540-72986-0_22
56 schema:sdDatePublished 2022-09-02T16:18
57 schema:sdLicense https://scigraph.springernature.com/explorer/license/
58 schema:sdPublisher N23b31f688f9a4fcb82c29cf4432cd7b9
59 schema:url https://doi.org/10.1007/978-3-540-72986-0_22
60 sgo:license sg:explorer/license/
61 sgo:sdDataset chapters
62 rdf:type schema:Chapter
63 N1f9215d6938a4e9e9b24ee5c5bc04a32 schema:familyName Burgess
64 schema:givenName Mark
65 rdf:type schema:Person
66 N23b31f688f9a4fcb82c29cf4432cd7b9 schema:name Springer Nature - SN SciGraph project
67 rdf:type schema:Organization
68 N45925e1682b141ddb6f33c8e088427ba rdf:first N1f9215d6938a4e9e9b24ee5c5bc04a32
69 rdf:rest rdf:nil
70 N4fa80261ae4c42eab67054dba19942ef schema:name Springer Nature
71 rdf:type schema:Organisation
72 N589b1d943cee4a8c80f9036ec73dddc8 schema:name dimensions_id
73 schema:value pub.1004626527
74 rdf:type schema:PropertyValue
75 N6f7097ecfd404c439e05dd70c845bdd3 rdf:first sg:person.013404167044.28
76 rdf:rest rdf:nil
77 N9345db9856e34d3fa44b796398181c77 schema:name doi
78 schema:value 10.1007/978-3-540-72986-0_22
79 rdf:type schema:PropertyValue
80 N94cf6dd63fca422d9077e7d96816326d schema:familyName Bandara
81 schema:givenName Arosha K.
82 rdf:type schema:Person
83 Na8f5490f6e454932995229246ac79ca0 rdf:first sg:person.07711264603.69
84 rdf:rest N6f7097ecfd404c439e05dd70c845bdd3
85 Nd5316b53738f4d599dcfdfb5ec9b944a schema:isbn 978-3-540-72985-3
86 978-3-540-72986-0
87 schema:name Inter-Domain Management
88 rdf:type schema:Book
89 Nda14cdb784444e18b2745d9f20848616 rdf:first N94cf6dd63fca422d9077e7d96816326d
90 rdf:rest N45925e1682b141ddb6f33c8e088427ba
91 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
92 schema:name Information and Computing Sciences
93 rdf:type schema:DefinedTerm
94 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
95 schema:name Data Format
96 rdf:type schema:DefinedTerm
97 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
98 schema:name Information Systems
99 rdf:type schema:DefinedTerm
100 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
101 schema:name Technology
102 rdf:type schema:DefinedTerm
103 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
104 schema:name Communications Technologies
105 rdf:type schema:DefinedTerm
106 sg:person.013404167044.28 schema:affiliation grid-institutes:grid.7445.2
107 schema:familyName Lupu
108 schema:givenName Emil
109 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404167044.28
110 rdf:type schema:Person
111 sg:person.07711264603.69 schema:affiliation grid-institutes:grid.7445.2
112 schema:familyName Tuptuk
113 schema:givenName Nilufer
114 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07711264603.69
115 rdf:type schema:Person
116 grid-institutes:grid.7445.2 schema:alternateName Department of Computing, Imperial College, 180 Queen’s Gate, London SW7 2AZ, UK
117 schema:name Department of Computing, Imperial College, 180 Queen’s Gate, London SW7 2AZ, UK
118 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...