Role management in adhoc networks

Qurban Memon, Shakil Akhtar, Alaa A. Aly

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

The purpose of an ad-hoc network is to enable interactions among its participants. It is thus important to ensure that these interactions are governed by well-defined policies that define the rules for accessing services and resources in the network. In order to address explicit specification of policies for each activity, an architectural framework is proposed to adapt policy based access control called role based access control (RBAC) model in the MANET environment. We analyze the possible wireless adhoc communication environment with respect to security and propose a layer where routine or dynamic analysis of adopted roles by devices can be formulated. We present analysis of such parameters and show that framework for these parameters within the proposed layer leads to better management during time critical operations of wireless adhoc networks.

Original languageEnglish
Title of host publication10th Communications and Networking Simulation Symposium, CNS 2007, Part of the 2007 Spring Simulation Multiconference, SpringSim 2007
Pages131-137
Number of pages7
Publication statusPublished - 2007
Event10th Communications and Networking Simulation Symposium, CNS 2007, Part of the 2007 Spring Simulation Multiconference, SpringSim 2007 - Norfolk, VA, United States
Duration: Mar 25 2007Mar 29 2007

Publication series

NameSimulation Series
ISSN (Print)0735-9276

Other

Other10th Communications and Networking Simulation Symposium, CNS 2007, Part of the 2007 Spring Simulation Multiconference, SpringSim 2007
Country/TerritoryUnited States
CityNorfolk, VA
Period3/25/073/29/07

Keywords

  • Collaboration
  • Group management
  • Mobile adhoc networks
  • Role based access control
  • Wireless adhoc networks

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Role management in adhoc networks'. Together they form a unique fingerprint.

Cite this