𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Access-controlled resource discovery in pervasive networks

✍ Scribed by Sanjay Raman; Dwaine Clarke; Matt Burnside; Srinivas Devadas; Ronald Rivest


Publisher
John Wiley and Sons
Year
2004
Tongue
English
Weight
561 KB
Volume
16
Category
Article
ISSN
1532-0626

No coin nor oath required. For personal study only.

✦ Synopsis


Abstract

Networks of the future will be characterized by a variety of computational devices that display a level of dynamism not seen in traditional wired networks. Because of the dynamic nature of these networks, resource discovery is one of the fundamental problems that must be solved. While resource discovery systems are not a novel concept, securing these systems in an efficient and scalable way is challenging. This paper describes the design and implementation of an architecture for access‐controlled resource discovery. This system achieves this goal by integrating access control with the Intentional Naming System (INS), a resource discovery and service location system. The integration is scalable, efficient, and fits well within a proxy‐based security framework designed for dynamic networks. We provide performance experiments that show how our solution outperforms existing schemes. The result is a system that provides secure, access‐controlled resource discovery that can scale to large numbers of resources and users. Copyright Β© 2004 John Wiley & Sons, Ltd.


πŸ“œ SIMILAR VOLUMES


Resource admission control in access net
✍ Sven Ooghe; Adrianus Van Ewijk; Ramesh Nagarajan πŸ“‚ Article πŸ“… 2008 πŸ› Institute of Electrical and Electronics Engineers 🌐 English βš– 468 KB
IP-driven access-independent resource ma
✍ Markus Bauer; Armin Dekorsy; Peter Schefczik; Michael Soellner πŸ“‚ Article πŸ“… 2007 πŸ› Institute of Electrical and Electronics Engineers 🌐 English βš– 694 KB

A key requirement on future networks is to provide the user with seamless broadband access for triple-play services via any available access technology with high end-to-end quality of service. In this paper we propose a novel resource management concept on the network layer that utilizes service-and

Efficient resource discovery in self-org
✍ Lu Liu; Nick Antonopoulos; Stephen Mackin; Jie Xu; Duncan Russell πŸ“‚ Article πŸ“… 2009 πŸ› John Wiley and Sons 🌐 English βš– 503 KB

## Abstract In unstructured peer‐to‐peer (P2P) networks, two autonomous peer nodes can be connected if users in those nodes are interested in each other's data. Owing to the similarity between P2P networks and social networks, where peer nodes can be regarded as people and connections can be regard

Access control in wireless sensor networ
✍ Yun Zhou; Yanchao Zhang; Yuguang Fang πŸ“‚ Article πŸ“… 2007 πŸ› Elsevier Science 🌐 English βš– 294 KB

Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious ''new'' nodes