skip to main content
10.1145/1579114.1579143acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

Privacy and resource protection in personal network federations

Published:09 June 2009Publication History

ABSTRACT

The emerging need for peer to peer communication in multi-user environments as well as the breakthrough of ubiquitous computing have contributed to the evolution of Personal Networking towards multiple network collaboration, namely the Personal Networks Federations. Nevertheless, in these environments new threat issues arise, calling for appropriate countermeasures. In this paper, the authors propose a framework for privacy protection in personal networking, based on the idea of creating a trust management mechanism that will meet the need for protecting privacy and safeguarding sensitive and personal information, while satisfying the need for validating and authorizing users that have access to personal resources.

References

  1. I. G. Niemegeers and S. Heemstra de Groot, "From Personal Area Networks to Personal Networks: A user oriented approach," Journal on Wireless and Personal Communications, v. 22, pp. 175--186, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Lo, M. Jacobsson, V. Prasad, and I. G. Niemegeers, "Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks," presented at the Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, San Jose California, July 2006.Google ScholarGoogle Scholar
  3. U. Javaid, D.-E. Meddour, T. Rasheed, and T. Ahmed, "A Profile-Based Network Layer Architecture for Personal Ubiquitous Environments," presented at the VTC2007 Vehicular Technology Conference, 2007-Spring, Dublin, Ireland.Google ScholarGoogle Scholar
  4. I. G. Niemegeers and S. M. Heemstra De Groot, "FEDNETS: Context-Aware Ad-hoc Network Federations," Wireless Personal Communcations, Springer, 2005, vol. 33, n. 3--4, pp. 305--318. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. National Security Agency, (n.d). "Defense in depth: a practical strategy for achieving information assurance in today's highly networked environments", Retrieved March 12, 2008, from http://www.nsa.gov/snac/support/defenseindepth.pdf.Google ScholarGoogle Scholar
  6. M. Bauer, "Practical threat analysis and risk management," Linux Journal {Online}, available: http://www.linuxjournal.com/article/5567, last accessed March 14th, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Politis, K. Nyberg, S. Mirzadeh, K. Masmoudi, H. Afifi, J. Floroiu, N. R. Prasad, "Personal Network Security Architecture", International Wireless Summit 2005, Wireless Personal Multimedia Communications '05, September 18--22, Aalborg, Denmark, 2005.Google ScholarGoogle Scholar
  8. H. Reiser and G. Vogt, "Threat analysis and security architecture of mobile agent based management systems," Network Operations and Management Symposium, 2000. NOMS 2000. 2000 IEEE/IFIP 10--14 April 2000, pp. 979--980.Google ScholarGoogle Scholar
  9. B. Gleeson, A. Lin, J. Heinaren, G. Armitage, and A. Malis, "A Framework for IP Based Virtual Private Networks", {Online} Retrieved March 14th, 2008 from: http://www.rennes.enst-bretagne.fr/~toutain/exam/3A9900D.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Ch. Patrikakis, M. Masikos, O. Zouraraki, "Distributed Denial of Service Attacks", Internet Protocol Journal, Cisco Systems, vol. 7, December 2004, pp 13--35.Google ScholarGoogle Scholar
  11. K. Scarfone, P. Mell, "Guide to Intrusion Detection and Prevention Systems (IDPS)", Recommendations of the U.S. National Institute of Standards and Technology, Information Technology Laboratory, National Institute of Standards and Technology, US Department of Commerce, February 2007.Google ScholarGoogle Scholar
  12. D. M. Kyriazanos, W. Louati, M. G. Genet, D. Zeghlache, M. Argyropoulos, and Ch. Z. Patrikakis, "An Architecture for Secure Wide-Area Service Discovery in Personal Peer-to-Peer Networks," presented at IST Mobile & Wireless Communications Summit, Mykonos, Greece, June 2006Google ScholarGoogle Scholar
  13. M. Kinateder, K. Rothermel, "Architecture and Algorithms for a Distributed Reputation System," presented at the First International Conference on Trust Management, Heraklion, Greece, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Bauer, R. L. Olsen, et al., "Context Management Framework for MAGNET Beyond", Workshop on Capturing Context and Context Aware Systems and Platforms, IST Mobile and Wireless Communications summit, Myconos, Greece, June 2005Google ScholarGoogle Scholar
  15. Ch. Z. Patrikakis, D. M. Kyriazanos, N. Prasad, "Establishing trust through anonymous and private information exchange over Personal Networks", accepted for publication with minor changes to Springer Wireless Personal Communications, Special Issue on "Information Security and data protection in Future Generation Communication and Networking", 2008.Google ScholarGoogle Scholar
  16. IST-MAGNET Beyond IR1.4.1 "Defining Usability of PN Services", August 2006, Retrieved March 14th, 2008 from: http://www.ist-magnet.org/public+deliverables.Google ScholarGoogle Scholar
  17. Ch. Z. Patrikakis, I. G. Nikolakopoulos, A. Skoufis, S. Stamokostas, "Safe access to computing resources in personal networking environments", accepted for poster presentation to the ICT-MobileSummit, Stockholm, Sweden, June 2008.Google ScholarGoogle Scholar

Index Terms

  1. Privacy and resource protection in personal network federations

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        PETRA '09: Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
        June 2009
        481 pages
        ISBN:9781605584096
        DOI:10.1145/1579114

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 June 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader