An Access Control Framework in an Ad Hoc Network Infrastructure

  • Tanya Koohpayeh Araghi
  • Mazdak Zamani
  • A. A. Manaf
  • Sagheb Kohpayeh Araghi
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 315)

Abstract

The union of an arbitrary topology constitutes of self-configuring mobile routers and associated hosts connecting by wireless links is called a mobile ad hoc network (MANET). In this paper, we propose an access control framework for an ad hoc network infrastructure. Compared with the wired and semi wireless network infrastructures in which users should be authenticated and given specific rules for access to the network resources, in an ad hoc network infrastructure some trusted nodes will be required to play the roles of authentication servers and policy enforcement rule servers when the previous servers leave the network. In order to reach to this purpose firstly, a model for Dynamic Monitoring in Ad hoc Networks is described which is going to be used as the trust based part of our proposed model, after that an access control Framework for semi-infrastructure ad hoc networks will be explained. Then, we will introduce our proposed framework to develop the mentioned semi ad hoc framework in a fully ad hoc network environment.

References

  1. 1.
    Bhatia, R., et al.: Security issues prtaining to ad hoc networks-a survey, IJCSMS Int. J. Comput. Sci. Manage. Stud. 12 (2012)Google Scholar
  2. 2.
    Araghi, T.K., Zamani, M., Manaf, A.A., Abdullah, S.M., Bojnord, H.S., Araghi, S.K.: A survey for prevention of black hole attacks in wireless mobile adhoc networks using IDS agents. 12th International Conference on Applied Computer and Applied Computational Science (ACACOS ‘13), Kuala Lumpur, Malaysia, 2–4 April 2013Google Scholar
  3. 3.
    Ghazizadeh, E., Zamani, M.: Cloud computing and single sign on: a literature review. Sci. World J. ISSN: 1537-744X. IF = 1.73. Q1 (Hindawi Publishing Corporation (UR)) (2013)Google Scholar
  4. 4.
    Janbeglou, M., Zamani, M., Ibrahim, S.: Redirecting network traffic toward a fake DNS server on a LAN. 3rd IEEE International Conference on Computer Science and Information Technology, pp. 429–433, Chengdu, China, 9–11 July 2010Google Scholar
  5. 5.
    Janbeglou, M., Zamani, M., Ibrahim, S.: Redirecting Outgoing DNS requests toward a fake DNS server in a LAN. IEEE International Conference on Software Engineering and Service Science, pp. 29–32. Beijing, China, 16–18 July 2010Google Scholar
  6. 6.
    S. Maity, et al., An access control framework for semi-infrastructured ad hoc networks, in Computer Technology and Development (ICCTD), 2010. 2nd International Conference on, 2010, pp. 708–712Google Scholar
  7. 7.
    Araghi, T.K., Zamani, M., Manaf, A.A., Abdullah, S.M., Bojnord, H.S., Araghi, S.K.: A secure model for prevention of black hole attack in wireless mobile ad hoc networks. 12th International Conference on Applied Computer and Applied Computational Science (ACACOS ‘13), Kuala Lumpur, Malaysia, 2–4 April 2013Google Scholar
  8. 8.
    Ghazizadeh, E., Zamani, M., Manan, J.A., Alizadeh, M.: Trusted Computing Strengthens Cloud Authentication. Sci. World J. 2014, Article ID 260187, 17 (2014). doi: 10.1155/2014/260187 (IF: 1.730)
  9. 9.
    Araghi, T.K., Zamani, M., Manaf, A.A.: Performance analysis in reactive routing protocols in wireless mobile ad hoc networks using DSR, AODV and AOMDV. International Conference on Informatics and Creative Multimedia 2013 (ICICM2013), pp. 76–79. Kuala Lumpur, 3–6 September 2013Google Scholar
  10. 10.
    Savola, R.M.: Node level security management and authentication in mobile ad hoc networks, in mobile data management: systems, services and middleware, 2009. MDM’09. Tenth International Conference on, 2009, pp. 449–458 (2009)Google Scholar
  11. 11.
    Araghi, T.K., Zamani, M., Manaf, A.A., Abdullah, S.M., Bojnord, H.S., Araghi, S.K.: A survey for prevention of black hole attack in wireless mobile ad hoc networks using cryptographic techniques. 12th International Conference on Applied Computer and Applied Computational Science (ACACOS ‘13), Kuala Lumpur, Malaysia, 2–4 April 2013Google Scholar
  12. 12.
    Mohebbi, K., Ibrahim, S., Zamani, M.: UltiMatch-NL: A web service matchmaker based on multiple semantic filters. PLOS ONE J. Publ. Libr. Sci. eISSN: 1932-6203. (UR). Impact factor (2012) = 3.73. Q1 (2013)Google Scholar
  13. 13.
    Beigzadeh, S., Zamani, M., Ibrahim, S.: Development of a web-based community management information system. The Fourth International Conference on Information and Computing (ICIC2011). pp. 3–6. Phuket, Thailand, 25–27 April 2011Google Scholar
  14. 14.
    Araghi, T.K., Zamani, M., Manaf, A.A., Abdullah, S.M., Bojnord, H.S., Araghi, S.K.: A survey for prevention of black hole attack in wireless mobile ad hoc networks using trusted neighbor nodes. 12th International Conference on Applied Computer and Applied Computational Science (ACACOS ‘13), Kuala Lumpur, Malaysia, 2–4 April 2013Google Scholar
  15. 15.
    Memon, Q.A.: Implementing role based access in healthcare ad hoc networks. J. Netw. 4, 192–199 (2009)Google Scholar
  16. 16.
    Sadeghian, A., Zamani, M.: Detecting and preventing DDoS attacks in botnets by the help of self triggered black holes. Asia-Pacific Conference on Computer Aided System Engineering (APCASE). Bali, Indonesia, 10–12 Feb 2014Google Scholar
  17. 17.
    Yazdanpanah, S., Chaeikar, S.S., Zamani, M., Kourdi, R.: Security features comparison of master key and ikm cryptographic key management for researchers and developers. 2011 3rd International Conference on Software Technology and Engineering (ICSTE 2011), pp. 365–369. Kuala Lumpur, Malaysia, 12–13 Aug 2011Google Scholar
  18. 18.
    Janbeglou, M., Zamani, M., Ibrahim, S.: Improving the security of protected wireless internet access from insider attacks. AISS: Adv. Inform. Sci. Serv. Sci. 4(12), 170–181. ISSN: 2233-9345 (2012)Google Scholar
  19. 19.
    Ghazizadeh, E., Zamani, M., Manan, J.A., Pashang, A.: A survey on security issues of federated identity in the cloud computing. IEEE International Conference on Cloud Computing Technology and Science, pp. 562–565. Taiwan, 3–6 Dec 2012Google Scholar
  20. 20.
    Alicherry, M., et al.: Deny-by-default distributed security policy enforcement in mobile ad hoc networks, In: Security and Privacy in Communication Networks, pp. 41–50 (2009)Google Scholar
  21. 21.
    Zhang, H., et al.: Bootstrapping deny-by-default access control for mobile ad hoc networks, In: Military Communications Conference, 2008. MILCOM 2008. IEEE, pp. 1–7 (2008)Google Scholar
  22. 22.
    Shohreh, H., et al.: Dynamic monitoring in ad hoc network. Appl. Mech. Mater. 229, 1481–1486 (2012)CrossRefGoogle Scholar
  23. 23.
    Honarbakhsh, S., Zamani, M., Honarbakhsh, R.: Dynamic Monitoring in Ad Hoc Network. Applied mechanics and materials, vols. 22–231, pp. 1481–1486. Trans Tech Publications, Switzerland. ISSN: 1660–9336 (2012)Google Scholar
  24. 24.
    Zamani, M. Manaf, A.A., Daruis, R.: Azizah technique for efficiency measurement in steganography. ICIDT 2012, 8th International Conference on Information Science and Digital Content Technology 3, pp. 480–484. Jeju, Korea, 26–28 June 2012Google Scholar
  25. 25.
    Ghazizadeh, E., Zamani, M., Manan, J.A., Khaleghparast, R., Taherian, A.: A trust based model for federated identity architecture to mitigate identity theft. International Conference for Internet Technology and Secured Transactions. London. 10–12 Dec 2012Google Scholar
  26. 26.
    Min, Z., Jiliu, Z.: Cooperative black hole attack prevention for mobile ad hoc networks, pp. 26–30 (2009)Google Scholar
  27. 27.
    Chaeikar, S.S., Razak, S.A., Honarbakhsh, S., Zeidanloo, H.R., Zamani, M., Jaryani, F.: Interpretative key management (IKM), a novel framework. 2010 International Conference on Computer Research and Development, pp. 265–269. Kuala Lumpur, Malaysia 7–9 May 2010Google Scholar
  28. 28.
    Nikbakhsh, S., Zamani, M., Manaf, A.A., Janbeglou, M.: A novel approach for rogue access point detection on the client-side. 26th IEEE International Conference on Advanced Information Networking and Applications. Japan, 26–29 March 2012Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Tanya Koohpayeh Araghi
    • 1
  • Mazdak Zamani
    • 1
  • A. A. Manaf
    • 1
  • Sagheb Kohpayeh Araghi
    • 2
  1. 1.Advanced Informatics SchoolUniversiti Teknologi MalaysiaKuala LumpurMalaysia
  2. 2.Faculty of EngineeringMultimedia University MalaysiaCyberjayaMalaysia

Personalised recommendations