期刊文献+

Multilevel security model for ad hoc networks 被引量:1

Multilevel security model for ad hoc networks
在线阅读 下载PDF
导出
摘要 Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页 系统工程与电子技术(英文版)
基金 the National Natural Science Foundation of China (60773049) the Natural Science Foundationof Jiangsu Province (BK2007086) the Fundamental Research Project of Natural Science in Colleges of Jiangsu Province(07KJB520016).
关键词 ad hoc network multilevel security model access control. ad hoc network, multilevel security model, access control.
  • 相关文献

参考文献12

  • 1Zhou L D, Haas Z J. Securing ad hoc networks. IEEE Network, 1999, 13(6): 24-30.
  • 2Papadimitratos P, Haas Z J, Zhou L D. Secure routing for mobile ad hoc networks. Proc. of CNDS, 2002:1-13.
  • 3Hu Y C, Perrig A, Johnson D B, Ariadne: a secure ondemand routing protocol for ad hoc networks. Wireless Networks, 2002, 11(1-2): 21-38
  • 4Dahill B, Levine B N, Royer E, et al. ARAN: a secure routing protocol for ad hoc networks. UMass Tech. Report, 02-32, 2002.
  • 5Hu Y C, Johnson D B, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Proc. of Fourth IEEE Workshop on Mobile Computing Systems and Applications, 2002: 3-13.
  • 6Bechler M, Hof H J, Kraft D, et al. A cluster-based security architecture for ad hoc networks. INFOCOM, 2004, 4(7- 11): 2393-2403.
  • 7Shamir A. How to share a secret. ACM Comm., 1979, 22(11): 612-613.
  • 8Matthew B, Dwaine C, Todd M, et al. Proxy-based security protocols in networked mobile devices. Proc. of the A CM Symposium on Applied Computing, 2002: 265-272.
  • 9Vesa K. Security in ad hoc networks. Seminar on Network Security, HUT TML, 2000: 1-16.
  • 10Hanne R N, Flemming N, Mikael B. Security for mobility. DEGAS Report Number WP6-IMM-I01-Int-001.

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部