Matrix analysis
Towards a task-based paradigm for flexible and adaptable access control in distributed applications
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
A review of port scanning techniques
ACM SIGCOMM Computer Communication Review
The Art and Science of Computer Security
The Art and Science of Computer Security
Dynamic and risk-aware network access management
Proceedings of the eighth ACM symposium on Access control models and technologies
Dynamic access control through Petri net workflows
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Using trust and risk in role-based access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Immune system approaches to intrusion detection --- a review
Natural Computing: an international journal
International Journal of Wireless and Mobile Computing
Routing of internal MANET traffic over external networks
Mobile Information Systems
Fault reconnaissance agent for sensor networks
Mobile Information Systems
Extending mobility to publish/subscribe systems using a pro-active caching approach
Mobile Information Systems
Audit-Based access control in nomadic wireless environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
A multi-hop advertising discovery and delivering protocol for multi administrative domain MANET
Mobile Information Systems
Emerging Wireless and Mobile Technologies
Mobile Information Systems - Emerging Wireless and Mobile Technologies
A methodology to counter DoS attacks in mobile IP communication
Mobile Information Systems
Detection of cross site scripting attack in wireless networks using n-Gram and SVM
Mobile Information Systems - Advances in Network-Based Information Systems
Hi-index | 0.00 |
Wireless networks are more and more popular in our life, but their increasing pervasiveness and widespread coverage raises serious security concerns. Mobile client devices potentially migrate, usually passing through very light access control policies, between numerous and heterogeneous wireless environments, bringing with them software vulnerabilities as well as possibly malicious code. To cope with these new security threats the paper proposes a new active third party authentication, authorization and security assessment strategy in which, once a device enters a new Wi-Fi environment, it is subjected to analysis by the infrastructure, and if it is found to be dangerously insecure, it is immediately taken out from the network and denied further access until its vulnerabilities have been fixed. The security assessment module, that is the fundamental component of the aforementioned strategy, takes advantage from a reliable knowledge base containing semantically-rich information about the mobile node under examination, dynamically provided by network mapping and configuration assessment facilities. It implements a fully automatic security analysis framework, based on AHP, which has been conceived to be flexible and customizable, to provide automated support for real-time execution of complex security/risk evaluation tasks which depends on the results obtained from different kind of analysis tools and methodologies. Encouraging results have been achieved utilizing a proof-of-concept model based on current technology and standard open-source networking tools.