Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers

Research Article

A Context-Aware Security Framework for Next Generation Mobile Networks

Download
514 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-04434-2_12,
        author={Matteo Bandinelli and Federica Paganelli and Gianluca Vannuccini and Dino Giuli},
        title={A Context-Aware Security Framework for Next Generation Mobile Networks},
        proceedings={Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers},
        proceedings_a={MOBISEC},
        year={2012},
        month={5},
        keywords={context-aware security multi-layer security policy security context contextual graph next generation communication networks},
        doi={10.1007/978-3-642-04434-2_12}
    }
    
  • Matteo Bandinelli
    Federica Paganelli
    Gianluca Vannuccini
    Dino Giuli
    Year: 2012
    A Context-Aware Security Framework for Next Generation Mobile Networks
    MOBISEC
    Springer
    DOI: 10.1007/978-3-642-04434-2_12
Matteo Bandinelli1,*, Federica Paganelli1,*, Gianluca Vannuccini1,*, Dino Giuli1,*
  • 1: Università degli Studi di Firenze
*Contact email: matteo.bandinelli@gmail.com, federica.paganelli@unifi.it, g.vannuccini@gmail.com, dino.giuli@unifi.it

Abstract

The openness and heterogeneity of next generation communication networks are now highlighting more security issues than those of traditional communication environments. Moreover users’ security requirements can often change in mobile communication environments, depending on the situation in which the user is immersed. Our objective is to define a context-aware security framework for addressing the problems of end-to-end security on behalf of end-users. Based on context data acquisition and aggregation features, the framework uses contextual graphs to define security policies encompassing actions at different layers of communication systems’ architecture, while adapting to changing circumstances.