Access-controlled resource discovery in pervasive networks
β Scribed by Sanjay Raman; Dwaine Clarke; Matt Burnside; Srinivas Devadas; Ronald Rivest
- Publisher
- John Wiley and Sons
- Year
- 2004
- Tongue
- English
- Weight
- 561 KB
- Volume
- 16
- Category
- Article
- ISSN
- 1532-0626
- DOI
- 10.1002/cpe.806
No coin nor oath required. For personal study only.
β¦ Synopsis
Abstract
Networks of the future will be characterized by a variety of computational devices that display a level of dynamism not seen in traditional wired networks. Because of the dynamic nature of these networks, resource discovery is one of the fundamental problems that must be solved. While resource discovery systems are not a novel concept, securing these systems in an efficient and scalable way is challenging. This paper describes the design and implementation of an architecture for accessβcontrolled resource discovery. This system achieves this goal by integrating access control with the Intentional Naming System (INS), a resource discovery and service location system. The integration is scalable, efficient, and fits well within a proxyβbased security framework designed for dynamic networks. We provide performance experiments that show how our solution outperforms existing schemes. The result is a system that provides secure, accessβcontrolled resource discovery that can scale to large numbers of resources and users. Copyright Β© 2004 John Wiley & Sons, Ltd.
π SIMILAR VOLUMES
A key requirement on future networks is to provide the user with seamless broadband access for triple-play services via any available access technology with high end-to-end quality of service. In this paper we propose a novel resource management concept on the network layer that utilizes service-and
## Abstract In unstructured peerβtoβpeer (P2P) networks, two autonomous peer nodes can be connected if users in those nodes are interested in each other's data. Owing to the similarity between P2P networks and social networks, where peer nodes can be regarded as people and connections can be regard
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious ''new'' nodes