Title :
Access control in ad hoc groups
Author :
Saxena, Nitesh ; Tsudik, Gene ; Hyun Yi, Jeong
Author_Institution :
Sch. of Inf. & Comput. Sci., California Univ., Irvine, CA, USA
Abstract :
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolerant computing and communication. Since such groups do not require any pre-deployed infrastructure or any trusted centralized authority they have many valuable applications in military and commercial settings as well as in emergency and rescue operations. However, due to lack of centralized control, ad hoc groups are inherently insecure and vulnerable to attacks from both within and outside the group. Decentralized access control is the fundamental security service for ad hoc groups. It is needed not only to prevent unauthorized nodes from becoming members but also to bootstrap other security services such as key management. In this paper, we survey a number of practical distributed access control mechanisms based on various flavors of threshold signatures.
Keywords :
access control; ad hoc networks; authorisation; fault tolerant computing; mobile communication; mobile computing; peer-to-peer computing; telecommunication security; MANET; access control; bootstrap; decentralized access control; fault-tolerant computing; fundamental security service; key management; mobile ad hoc network; peer-to-peer system; practical distributed access control mechanism; pre-deployed infrastructure; threshold signature; trusted centralized authority; Access control; Admission control; Centralized control; Certification; Cryptography; Fault tolerance; Military computing; Mobile ad hoc networks; Peer to peer computing; Security;
Conference_Titel :
Peer-to-Peer Systems, 2004. International Workshop on Hot Topics in
Print_ISBN :
0-7695-2269-6
DOI :
10.1109/PTPSYS.2004.2