1st International ICST Conference on Autonomic Computing and Communication Systems

Research Article

A Security Policy System for Mobile Autonomic Networks

Download122 downloads
  • @INPROCEEDINGS{10.4108/ICST.AUTONOMICS2007.2205,
        author={Mohamad Aljnidi and Jean Leneutre},
        title={A Security Policy System for Mobile Autonomic Networks},
        proceedings={1st International ICST Conference on Autonomic Computing and Communication Systems},
        publisher={ICST},
        proceedings_a={AUTONOMICS},
        year={2007},
        month={10},
        keywords={Autonomic Computing Ad-Hoc Networks Autonomic Networks Security Models Security Policy Management.},
        doi={10.4108/ICST.AUTONOMICS2007.2205}
    }
    
  • Mohamad Aljnidi
    Jean Leneutre
    Year: 2007
    A Security Policy System for Mobile Autonomic Networks
    AUTONOMICS
    ICST
    DOI: 10.4108/ICST.AUTONOMICS2007.2205
Mohamad Aljnidi1,*, Jean Leneutre2,*
  • 1: CNRS - UMR 5141 (LTCI)TELECOM PARIS - INFRES Department 37/39, rue Dareau - 75014 Paris - France +33(0)1 45 81 71 56
  • 2: CNRS - UMR 5141 (LTCI) TELECOM PARIS - INFRES Department 46, rue Barrault - 75013 Paris - France +33(0)1 45 81 78 81
*Contact email: mohamad.aljnidi@enst.fr, jean.leneutre@enst.fr

Abstract

An autonomic security system is indispensable for the operation of an autonomic network. Policies are basic stones in building autonomic systems. In this paper, we introduce our model of mobile autonomic networks. Accordingly, we propose a security framework for building autonomic security systems. In this framework, we discuss a trust model based on node communities, an authentication model based on node categorization, and a secure relation model based on both trust and node capabilities. A network evolution model is eventually presented as the working context of an autonomic security system. Afterwards, we explain our vision of autonomic policy systems, and relevantly present solutions for security policy representation and manipulation. Finally, we define an authorization model for mobile autonomic networks, before elaborating an example of the implementation and the negotiation of a relevant access control policy.