Loading…
Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks
Special operations such as emergency response as well as military missions are usually characterized by the limited resources available to handle generally large-scale operations. Precise resource discovery and allocation thus becomes an important factor for the success of such operations. This task...
Saved in:
Published in: | International journal of computer science and information security 2015-09, Vol.13 (9), p.45-45 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 45 |
container_issue | 9 |
container_start_page | 45 |
container_title | International journal of computer science and information security |
container_volume | 13 |
creator | Serhani, M Adel Gadallah, Yasser Barka, Ezedin |
description | Special operations such as emergency response as well as military missions are usually characterized by the limited resources available to handle generally large-scale operations. Precise resource discovery and allocation thus becomes an important factor for the success of such operations. This task has been recognized as a challenging research issue. This is due to the dynamic nature of the emergency response elements e.g., personnel and equipment. One of the important requirements of these operations is achieving the security of the communications involved in the resource discovery and allocation tasks. Security ensures the confidentiality, integrity, and availability of the communicated information. Therefore, solutions that are intended for selecting best matching service(s) should not only rely on the functional properties of the service but also on level of security under which this service is provided. In this study, we propose a secure multicast service discovery architecture that is based on a mobile ad hoc network (MANET) of operation participants. The main objective is to locate, select, reserve and assign certain resources to parties that are in need of these resources. The involved communications are designed to be secure multicast-based, utilizing features of the Role-Based Access Control (RBAC) Model. We describe the details of the proposed communication protocol. We then qualitatively compare our architecture to other alternative MANET-based service discovery architectures. The comparison highlights the merits of the proposed architecture. Finally, we conduct and present the results of a set of experiments to evaluate key features of our proposed architecture. |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1770282831</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1770282831</sourcerecordid><originalsourceid>FETCH-LOGICAL-p611-9e4c85a45a20a1d6b0dbbd04d39b28b70ec3e465929c9900e12a9f53bbb2fc323</originalsourceid><addsrcrecordid>eNpdzstKAzEUBuAgCJbadwi4cTOQ68xkWeoVql1M9yWXM5o6JjWZqejTG7Erz-YcDh8__xmaUSWaSkpCLtAi5z0pw6mQVM7QSwfp6C1Um-QhjODwMtlXP4IdpwS4jwl3YH_PE8Q3Ptt4hPSFdXDlOxTqY8A-4O4A1uvBf5eYp2j8APgZxs-Y3vIlOu_1kGFx2nO0vbvdrh6q9eb-cbVcV4ea0kqBsK3UQmpGNHW1Ic4YR4TjyrDWNAQsB1FLxZRVihCgTKtecmMM6y1nfI6u_2IPKX5MkMfde6kLw6ADxCnvaNMQ1rKW00Kv_tF9nFIo5YpiVDWqrgX_AXdiYSc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1721979664</pqid></control><display><type>article</type><title>Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Serhani, M Adel ; Gadallah, Yasser ; Barka, Ezedin</creator><creatorcontrib>Serhani, M Adel ; Gadallah, Yasser ; Barka, Ezedin</creatorcontrib><description>Special operations such as emergency response as well as military missions are usually characterized by the limited resources available to handle generally large-scale operations. Precise resource discovery and allocation thus becomes an important factor for the success of such operations. This task has been recognized as a challenging research issue. This is due to the dynamic nature of the emergency response elements e.g., personnel and equipment. One of the important requirements of these operations is achieving the security of the communications involved in the resource discovery and allocation tasks. Security ensures the confidentiality, integrity, and availability of the communicated information. Therefore, solutions that are intended for selecting best matching service(s) should not only rely on the functional properties of the service but also on level of security under which this service is provided. In this study, we propose a secure multicast service discovery architecture that is based on a mobile ad hoc network (MANET) of operation participants. The main objective is to locate, select, reserve and assign certain resources to parties that are in need of these resources. The involved communications are designed to be secure multicast-based, utilizing features of the Role-Based Access Control (RBAC) Model. We describe the details of the proposed communication protocol. We then qualitatively compare our architecture to other alternative MANET-based service discovery architectures. The comparison highlights the merits of the proposed architecture. Finally, we conduct and present the results of a set of experiments to evaluate key features of our proposed architecture.</description><identifier>EISSN: 1947-5500</identifier><language>eng</language><publisher>Pittsburgh: L J S Publishing</publisher><subject>Access control ; Ad hoc networks ; Algorithms ; Allocations ; Architecture ; Communication ; Computer information security ; Confidentiality ; Emergency response ; Mathematical models ; Medical personnel ; Mobile communication systems ; Public Key Infrastructure ; Wireless networks</subject><ispartof>International journal of computer science and information security, 2015-09, Vol.13 (9), p.45-45</ispartof><rights>Copyright L J S Publishing Sep 2015</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Serhani, M Adel</creatorcontrib><creatorcontrib>Gadallah, Yasser</creatorcontrib><creatorcontrib>Barka, Ezedin</creatorcontrib><title>Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks</title><title>International journal of computer science and information security</title><description>Special operations such as emergency response as well as military missions are usually characterized by the limited resources available to handle generally large-scale operations. Precise resource discovery and allocation thus becomes an important factor for the success of such operations. This task has been recognized as a challenging research issue. This is due to the dynamic nature of the emergency response elements e.g., personnel and equipment. One of the important requirements of these operations is achieving the security of the communications involved in the resource discovery and allocation tasks. Security ensures the confidentiality, integrity, and availability of the communicated information. Therefore, solutions that are intended for selecting best matching service(s) should not only rely on the functional properties of the service but also on level of security under which this service is provided. In this study, we propose a secure multicast service discovery architecture that is based on a mobile ad hoc network (MANET) of operation participants. The main objective is to locate, select, reserve and assign certain resources to parties that are in need of these resources. The involved communications are designed to be secure multicast-based, utilizing features of the Role-Based Access Control (RBAC) Model. We describe the details of the proposed communication protocol. We then qualitatively compare our architecture to other alternative MANET-based service discovery architectures. The comparison highlights the merits of the proposed architecture. Finally, we conduct and present the results of a set of experiments to evaluate key features of our proposed architecture.</description><subject>Access control</subject><subject>Ad hoc networks</subject><subject>Algorithms</subject><subject>Allocations</subject><subject>Architecture</subject><subject>Communication</subject><subject>Computer information security</subject><subject>Confidentiality</subject><subject>Emergency response</subject><subject>Mathematical models</subject><subject>Medical personnel</subject><subject>Mobile communication systems</subject><subject>Public Key Infrastructure</subject><subject>Wireless networks</subject><issn>1947-5500</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNpdzstKAzEUBuAgCJbadwi4cTOQ68xkWeoVql1M9yWXM5o6JjWZqejTG7Erz-YcDh8__xmaUSWaSkpCLtAi5z0pw6mQVM7QSwfp6C1Um-QhjODwMtlXP4IdpwS4jwl3YH_PE8Q3Ptt4hPSFdXDlOxTqY8A-4O4A1uvBf5eYp2j8APgZxs-Y3vIlOu_1kGFx2nO0vbvdrh6q9eb-cbVcV4ea0kqBsK3UQmpGNHW1Ic4YR4TjyrDWNAQsB1FLxZRVihCgTKtecmMM6y1nfI6u_2IPKX5MkMfde6kLw6ADxCnvaNMQ1rKW00Kv_tF9nFIo5YpiVDWqrgX_AXdiYSc</recordid><startdate>20150901</startdate><enddate>20150901</enddate><creator>Serhani, M Adel</creator><creator>Gadallah, Yasser</creator><creator>Barka, Ezedin</creator><general>L J S Publishing</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20150901</creationdate><title>Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks</title><author>Serhani, M Adel ; Gadallah, Yasser ; Barka, Ezedin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p611-9e4c85a45a20a1d6b0dbbd04d39b28b70ec3e465929c9900e12a9f53bbb2fc323</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Access control</topic><topic>Ad hoc networks</topic><topic>Algorithms</topic><topic>Allocations</topic><topic>Architecture</topic><topic>Communication</topic><topic>Computer information security</topic><topic>Confidentiality</topic><topic>Emergency response</topic><topic>Mathematical models</topic><topic>Medical personnel</topic><topic>Mobile communication systems</topic><topic>Public Key Infrastructure</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Serhani, M Adel</creatorcontrib><creatorcontrib>Gadallah, Yasser</creatorcontrib><creatorcontrib>Barka, Ezedin</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer science and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Serhani, M Adel</au><au>Gadallah, Yasser</au><au>Barka, Ezedin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks</atitle><jtitle>International journal of computer science and information security</jtitle><date>2015-09-01</date><risdate>2015</risdate><volume>13</volume><issue>9</issue><spage>45</spage><epage>45</epage><pages>45-45</pages><eissn>1947-5500</eissn><abstract>Special operations such as emergency response as well as military missions are usually characterized by the limited resources available to handle generally large-scale operations. Precise resource discovery and allocation thus becomes an important factor for the success of such operations. This task has been recognized as a challenging research issue. This is due to the dynamic nature of the emergency response elements e.g., personnel and equipment. One of the important requirements of these operations is achieving the security of the communications involved in the resource discovery and allocation tasks. Security ensures the confidentiality, integrity, and availability of the communicated information. Therefore, solutions that are intended for selecting best matching service(s) should not only rely on the functional properties of the service but also on level of security under which this service is provided. In this study, we propose a secure multicast service discovery architecture that is based on a mobile ad hoc network (MANET) of operation participants. The main objective is to locate, select, reserve and assign certain resources to parties that are in need of these resources. The involved communications are designed to be secure multicast-based, utilizing features of the Role-Based Access Control (RBAC) Model. We describe the details of the proposed communication protocol. We then qualitatively compare our architecture to other alternative MANET-based service discovery architectures. The comparison highlights the merits of the proposed architecture. Finally, we conduct and present the results of a set of experiments to evaluate key features of our proposed architecture.</abstract><cop>Pittsburgh</cop><pub>L J S Publishing</pub><tpages>1</tpages></addata></record> |
fulltext | fulltext |
identifier | EISSN: 1947-5500 |
ispartof | International journal of computer science and information security, 2015-09, Vol.13 (9), p.45-45 |
issn | 1947-5500 |
language | eng |
recordid | cdi_proquest_miscellaneous_1770282831 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Access control Ad hoc networks Algorithms Allocations Architecture Communication Computer information security Confidentiality Emergency response Mathematical models Medical personnel Mobile communication systems Public Key Infrastructure Wireless networks |
title | Service-Oriented Architecture for Secure Service Discovery and Selection in Specialized Mobile Networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T01%3A05%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Service-Oriented%20Architecture%20for%20Secure%20Service%20Discovery%20and%20Selection%20in%20Specialized%20Mobile%20Networks&rft.jtitle=International%20journal%20of%20computer%20science%20and%20information%20security&rft.au=Serhani,%20M%20Adel&rft.date=2015-09-01&rft.volume=13&rft.issue=9&rft.spage=45&rft.epage=45&rft.pages=45-45&rft.eissn=1947-5500&rft_id=info:doi/&rft_dat=%3Cproquest%3E1770282831%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p611-9e4c85a45a20a1d6b0dbbd04d39b28b70ec3e465929c9900e12a9f53bbb2fc323%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1721979664&rft_id=info:pmid/&rfr_iscdi=true |