MILCOM 2008 - 2008 IEEE Military Communications Conference 2008
DOI: 10.1109/milcom.2008.4753174
|View full text |Cite
|
Sign up to set email alerts
|

Bootstrapping deny-by-default access control for mobile ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 10 publications
0
14
0
Order By: Relevance
“…This paper extends the work in [20], seeking to answer the following questions: 1) To what extent can an adversary undermine the correctness and the performance of the Bootstrap protocol? 2) To what extent can the Bootstrap protocol be improved in anticipation of an adversary?…”
Section: Introductionmentioning
confidence: 92%
See 1 more Smart Citation
“…This paper extends the work in [20], seeking to answer the following questions: 1) To what extent can an adversary undermine the correctness and the performance of the Bootstrap protocol? 2) To what extent can the Bootstrap protocol be improved in anticipation of an adversary?…”
Section: Introductionmentioning
confidence: 92%
“…Our previous work [20] addressed this challenge by defining (i) an axiomatic set of policies from which nodes can obtain additional policies or update outdated policies and (ii) a protocol (referred to as the Bootstrap protocol) by which nodes form, or bootstrap, the neighbor relationships among themselves in a manner consistent with current policy 1 . Along with the definition of the Bootstrap protocol as a Finite State Machine (FSM) [5] [20], we also proved its correctness (safety and liveness); however, this initial analysis neglected the possibility of nodes or wireless channel being subverted by a knowledgeable adversary.…”
Section: Introductionmentioning
confidence: 99%
“…This approach is more viable in a mesh network than a deny-by-default one: for the last one to be usable, the rule-sets must be perfectly synchronized and updated; otherwise, there is the risk of dropping legitimate traffic. In networks where a high security level is required, also deny-by-default rule-set can be used as in [16,17], but it does not match our network scenario.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…As in reference [10] bootstrapping of policy-based access control in a deny-by-default the researcher with codification clear politics and rules and initial setup these try to determine necessary actions the system components are allowed to do it. They with a basic rules added to own mechanism functionality an updating, adding new rules and publishing set of ability that help to nodes for connectivity with own neighbors.…”
Section: B the Nac Related Work In Manetsmentioning
confidence: 99%