1st International ICST Workshop on Mobile and Distributed Approaches in Emergency Scenarios

Research Article

Security and privacy issues in middleware for emergency and rescue applications

Download500 downloads
  • @INPROCEEDINGS{10.4108/ICST.PERVASIVEHEALTH2008.2573 ,
        author={Matija  Pužar and Thomas  Plagemann and Yves  Roudier},
        title={Security and privacy issues in middleware for emergency and rescue applications},
        proceedings={1st International ICST Workshop on Mobile and Distributed Approaches in Emergency Scenarios},
        publisher={IEEE},
        proceedings_a={MODIES},
        year={2008},
        month={7},
        keywords={security access control mobile ad-hoc networks},
        doi={10.4108/ICST.PERVASIVEHEALTH2008.2573 }
    }
    
  • Matija Pužar
    Thomas Plagemann
    Yves Roudier
    Year: 2008
    Security and privacy issues in middleware for emergency and rescue applications
    MODIES
    IEEE
    DOI: 10.4108/ICST.PERVASIVEHEALTH2008.2573
Matija Pužar1,*, Thomas Plagemann1,*, Yves Roudier2,*
  • 1: Department of Informatics, University of Oslo, Oslo, Norway.
  • 2: Institut Eurécom, Sophia-Antipolis, France.
*Contact email: matija@ifi.uio.no, plageman@ifi.uio.no, yves.roudier@eurecom.fr

Abstract

Mobile ad-hoc networks (MANETs) are a natural candidate for communication and information exchange in emergency and rescue operations. The personnelpsilas movements, network disruptions and other system dynamics make it hard to implement robust applications for such environments. The MIDAS project aims at creating a middleware platform to simplify the task of developing and deploying mobile and robust services for events in which the network might be set-up at short notice. MANETs may be used because infrastructure is non-existing, and the number of users might be very high. One of the application domains addressed by MIDAS are emergency and rescue operations. To get a broad acceptance of the MIDAS solutions, security and privacy issues need also to be addressed. In this paper, we analyze the security threats and present a two-way approach to securing the MIDAS architecture. In the bottom-up approach, we use an efficient key management protocol to establish trust, and in the top-down approach we use dynamic role based access control to secure the system and provide privacy.