Loading…

Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks

Special operations such as emergency response as well as military missions are usually characterized by the limited resources available to handle generally large-scale operations. Precise resource discovery and allocation thus becomes an important factor for the success of such operations. This task...

Full description

Saved in:
Bibliographic Details
Published in:International journal of computer science and information security 2015-09, Vol.13 (9), p.45-45
Main Authors: Serhani, M Adel, Gadallah, Yasser, Barka, Ezedin
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 45
container_issue 9
container_start_page 45
container_title International journal of computer science and information security
container_volume 13
creator Serhani, M Adel
Gadallah, Yasser
Barka, Ezedin
description Special operations such as emergency response as well as military missions are usually characterized by the limited resources available to handle generally large-scale operations. Precise resource discovery and allocation thus becomes an important factor for the success of such operations. This task has been recognized as a challenging research issue. This is due to the dynamic nature of the emergency response elements e.g., personnel and equipment. One of the important requirements of these operations is achieving the security of the communications involved in the resource discovery and allocation tasks. Security ensures the confidentiality, integrity, and availability of the communicated information. Therefore, solutions that are intended for selecting best matching service(s) should not only rely on the functional properties of the service but also on level of security under which this service is provided. In this study, we propose a secure multicast service discovery architecture that is based on a mobile ad hoc network (MANET) of operation participants. The main objective is to locate, select, reserve and assign certain resources to parties that are in need of these resources. The involved communications are designed to be secure multicast-based, utilizing features of the Role-Based Access Control (RBAC) Model. We describe the details of the proposed communication protocol. We then qualitatively compare our architecture to other alternative MANET-based service discovery architectures. The comparison highlights the merits of the proposed architecture. Finally, we conduct and present the results of a set of experiments to evaluate key features of our proposed architecture.
format article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1770282831</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1770282831</sourcerecordid><originalsourceid>FETCH-LOGICAL-p611-9e4c85a45a20a1d6b0dbbd04d39b28b70ec3e465929c9900e12a9f53bbb2fc323</originalsourceid><addsrcrecordid>eNpdzstKAzEUBuAgCJbadwi4cTOQ68xkWeoVql1M9yWXM5o6JjWZqejTG7Erz-YcDh8__xmaUSWaSkpCLtAi5z0pw6mQVM7QSwfp6C1Um-QhjODwMtlXP4IdpwS4jwl3YH_PE8Q3Ptt4hPSFdXDlOxTqY8A-4O4A1uvBf5eYp2j8APgZxs-Y3vIlOu_1kGFx2nO0vbvdrh6q9eb-cbVcV4ea0kqBsK3UQmpGNHW1Ic4YR4TjyrDWNAQsB1FLxZRVihCgTKtecmMM6y1nfI6u_2IPKX5MkMfde6kLw6ADxCnvaNMQ1rKW00Kv_tF9nFIo5YpiVDWqrgX_AXdiYSc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1721979664</pqid></control><display><type>article</type><title>Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Serhani, M Adel ; Gadallah, Yasser ; Barka, Ezedin</creator><creatorcontrib>Serhani, M Adel ; Gadallah, Yasser ; Barka, Ezedin</creatorcontrib><description>Special operations such as emergency response as well as military missions are usually characterized by the limited resources available to handle generally large-scale operations. Precise resource discovery and allocation thus becomes an important factor for the success of such operations. This task has been recognized as a challenging research issue. This is due to the dynamic nature of the emergency response elements e.g., personnel and equipment. One of the important requirements of these operations is achieving the security of the communications involved in the resource discovery and allocation tasks. Security ensures the confidentiality, integrity, and availability of the communicated information. Therefore, solutions that are intended for selecting best matching service(s) should not only rely on the functional properties of the service but also on level of security under which this service is provided. In this study, we propose a secure multicast service discovery architecture that is based on a mobile ad hoc network (MANET) of operation participants. The main objective is to locate, select, reserve and assign certain resources to parties that are in need of these resources. The involved communications are designed to be secure multicast-based, utilizing features of the Role-Based Access Control (RBAC) Model. We describe the details of the proposed communication protocol. We then qualitatively compare our architecture to other alternative MANET-based service discovery architectures. The comparison highlights the merits of the proposed architecture. Finally, we conduct and present the results of a set of experiments to evaluate key features of our proposed architecture.</description><identifier>EISSN: 1947-5500</identifier><language>eng</language><publisher>Pittsburgh: L J S Publishing</publisher><subject>Access control ; Ad hoc networks ; Algorithms ; Allocations ; Architecture ; Communication ; Computer information security ; Confidentiality ; Emergency response ; Mathematical models ; Medical personnel ; Mobile communication systems ; Public Key Infrastructure ; Wireless networks</subject><ispartof>International journal of computer science and information security, 2015-09, Vol.13 (9), p.45-45</ispartof><rights>Copyright L J S Publishing Sep 2015</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Serhani, M Adel</creatorcontrib><creatorcontrib>Gadallah, Yasser</creatorcontrib><creatorcontrib>Barka, Ezedin</creatorcontrib><title>Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks</title><title>International journal of computer science and information security</title><description>Special operations such as emergency response as well as military missions are usually characterized by the limited resources available to handle generally large-scale operations. Precise resource discovery and allocation thus becomes an important factor for the success of such operations. This task has been recognized as a challenging research issue. This is due to the dynamic nature of the emergency response elements e.g., personnel and equipment. One of the important requirements of these operations is achieving the security of the communications involved in the resource discovery and allocation tasks. Security ensures the confidentiality, integrity, and availability of the communicated information. Therefore, solutions that are intended for selecting best matching service(s) should not only rely on the functional properties of the service but also on level of security under which this service is provided. In this study, we propose a secure multicast service discovery architecture that is based on a mobile ad hoc network (MANET) of operation participants. The main objective is to locate, select, reserve and assign certain resources to parties that are in need of these resources. The involved communications are designed to be secure multicast-based, utilizing features of the Role-Based Access Control (RBAC) Model. We describe the details of the proposed communication protocol. We then qualitatively compare our architecture to other alternative MANET-based service discovery architectures. The comparison highlights the merits of the proposed architecture. Finally, we conduct and present the results of a set of experiments to evaluate key features of our proposed architecture.</description><subject>Access control</subject><subject>Ad hoc networks</subject><subject>Algorithms</subject><subject>Allocations</subject><subject>Architecture</subject><subject>Communication</subject><subject>Computer information security</subject><subject>Confidentiality</subject><subject>Emergency response</subject><subject>Mathematical models</subject><subject>Medical personnel</subject><subject>Mobile communication systems</subject><subject>Public Key Infrastructure</subject><subject>Wireless networks</subject><issn>1947-5500</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNpdzstKAzEUBuAgCJbadwi4cTOQ68xkWeoVql1M9yWXM5o6JjWZqejTG7Erz-YcDh8__xmaUSWaSkpCLtAi5z0pw6mQVM7QSwfp6C1Um-QhjODwMtlXP4IdpwS4jwl3YH_PE8Q3Ptt4hPSFdXDlOxTqY8A-4O4A1uvBf5eYp2j8APgZxs-Y3vIlOu_1kGFx2nO0vbvdrh6q9eb-cbVcV4ea0kqBsK3UQmpGNHW1Ic4YR4TjyrDWNAQsB1FLxZRVihCgTKtecmMM6y1nfI6u_2IPKX5MkMfde6kLw6ADxCnvaNMQ1rKW00Kv_tF9nFIo5YpiVDWqrgX_AXdiYSc</recordid><startdate>20150901</startdate><enddate>20150901</enddate><creator>Serhani, M Adel</creator><creator>Gadallah, Yasser</creator><creator>Barka, Ezedin</creator><general>L J S Publishing</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20150901</creationdate><title>Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks</title><author>Serhani, M Adel ; Gadallah, Yasser ; Barka, Ezedin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p611-9e4c85a45a20a1d6b0dbbd04d39b28b70ec3e465929c9900e12a9f53bbb2fc323</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Access control</topic><topic>Ad hoc networks</topic><topic>Algorithms</topic><topic>Allocations</topic><topic>Architecture</topic><topic>Communication</topic><topic>Computer information security</topic><topic>Confidentiality</topic><topic>Emergency response</topic><topic>Mathematical models</topic><topic>Medical personnel</topic><topic>Mobile communication systems</topic><topic>Public Key Infrastructure</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Serhani, M Adel</creatorcontrib><creatorcontrib>Gadallah, Yasser</creatorcontrib><creatorcontrib>Barka, Ezedin</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer science and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Serhani, M Adel</au><au>Gadallah, Yasser</au><au>Barka, Ezedin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks</atitle><jtitle>International journal of computer science and information security</jtitle><date>2015-09-01</date><risdate>2015</risdate><volume>13</volume><issue>9</issue><spage>45</spage><epage>45</epage><pages>45-45</pages><eissn>1947-5500</eissn><abstract>Special operations such as emergency response as well as military missions are usually characterized by the limited resources available to handle generally large-scale operations. Precise resource discovery and allocation thus becomes an important factor for the success of such operations. This task has been recognized as a challenging research issue. This is due to the dynamic nature of the emergency response elements e.g., personnel and equipment. One of the important requirements of these operations is achieving the security of the communications involved in the resource discovery and allocation tasks. Security ensures the confidentiality, integrity, and availability of the communicated information. Therefore, solutions that are intended for selecting best matching service(s) should not only rely on the functional properties of the service but also on level of security under which this service is provided. In this study, we propose a secure multicast service discovery architecture that is based on a mobile ad hoc network (MANET) of operation participants. The main objective is to locate, select, reserve and assign certain resources to parties that are in need of these resources. The involved communications are designed to be secure multicast-based, utilizing features of the Role-Based Access Control (RBAC) Model. We describe the details of the proposed communication protocol. We then qualitatively compare our architecture to other alternative MANET-based service discovery architectures. The comparison highlights the merits of the proposed architecture. Finally, we conduct and present the results of a set of experiments to evaluate key features of our proposed architecture.</abstract><cop>Pittsburgh</cop><pub>L J S Publishing</pub><tpages>1</tpages></addata></record>
fulltext fulltext
identifier EISSN: 1947-5500
ispartof International journal of computer science and information security, 2015-09, Vol.13 (9), p.45-45
issn 1947-5500
language eng
recordid cdi_proquest_miscellaneous_1770282831
source EZB-FREE-00999 freely available EZB journals
subjects Access control
Ad hoc networks
Algorithms
Allocations
Architecture
Communication
Computer information security
Confidentiality
Emergency response
Mathematical models
Medical personnel
Mobile communication systems
Public Key Infrastructure
Wireless networks
title Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T01%3A05%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Service-Oriented%20Architecture%20for%20Secure%20Service%20Discovery%20and%20Selection%20in%20Specialized%20Mobile%20Networks&rft.jtitle=International%20journal%20of%20computer%20science%20and%20information%20security&rft.au=Serhani,%20M%20Adel&rft.date=2015-09-01&rft.volume=13&rft.issue=9&rft.spage=45&rft.epage=45&rft.pages=45-45&rft.eissn=1947-5500&rft_id=info:doi/&rft_dat=%3Cproquest%3E1770282831%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p611-9e4c85a45a20a1d6b0dbbd04d39b28b70ec3e465929c9900e12a9f53bbb2fc323%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1721979664&rft_id=info:pmid/&rfr_iscdi=true