A security policy system for mobile autonomic networks

Mohamad Aljnidi, Jean Leneutre

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

An autonomic security system is indispensable for the operation of an autonomic network. Policies are basic stones in building autonomic systems. In this paper, we introduce our model of mobile autonomic networks. Accordingly, we propose a security framework for building autonomic security systems. In this framework, we discuss a trust model based on node communities, an authentication model based on node categorization, and a secure relation model based on both trust and node capabilities. A network evolution model is eventually presented as the working context of an autonomic security system. Afterwards, we explain our vision of autonomic policy systems, and relevantly present solutions for security policy representation and manipulation. Finally, we define an authorization model for mobile autonomic networks, before elaborating an example of the implementation and the negotiation of a relevant access control policy.

Original languageEnglish
Title of host publicationProceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics 2007
PublisherICST
ISBN (Electronic)9789639799097
DOIs
Publication statusPublished - 1 Jan 2007
Externally publishedYes
Event1st International Conference on Autonomic Computing and Communication Systems, Autonomics 2007 - Rome, Italy
Duration: 28 Oct 200730 Oct 2007

Publication series

NameProceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics 2007

Conference

Conference1st International Conference on Autonomic Computing and Communication Systems, Autonomics 2007
Country/TerritoryItaly
CityRome
Period28/10/0730/10/07

Keywords

  • Ad-Hoc Networks
  • Autonomic Computing
  • Autonomic Networks
  • Security Models
  • Security Policy Management

Fingerprint

Dive into the research topics of 'A security policy system for mobile autonomic networks'. Together they form a unique fingerprint.

Cite this