Security Management for Mobile Ad Hoc Network of Networks (MANoN)
Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and flexible manner. As a result, the development of the Global Information Grid (GIG) was the key enabler for this process; hence, adding to...
Gespeichert in:
Veröffentlicht in: | International journal of mobile computing and multimedia communications 2010-01, Vol.2 (1), p.1-19 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 19 |
---|---|
container_issue | 1 |
container_start_page | 1 |
container_title | International journal of mobile computing and multimedia communications |
container_volume | 2 |
creator | Al-Bayatti, Ali H Zedan, Hussein Cau, Antoniuo Siewe, François |
description | Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and flexible manner. As a result, the development of the Global Information Grid (GIG) was the key enabler for this process; hence, adding to the development of the mobile networking part of the GIG, the concept of the Mobile Ad hoc Network of Networks (MANoN) is introduced. This article proposes a novel security management algorithm achieving the three management essentials: Security Administration; Prevention and Detection; and Containment and Recovery; based on the International Telecommunication Union’s recommendation M.3400 to manage securely the future of military Network-Centric Warfare (NCW). The authors will employ Interval Temporal Logic (ITL) as a method of handling both sequential and parallel composition in flexible timely constrains, in addition, this technique will be evaluated using the Network Simulator (NS-2) to provide and check whether security requirements are met in a comprehensive manner. |
doi_str_mv | 10.4018/jmcmc.2010103001 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_miscellaneous_1349421714</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A760530472</galeid><sourcerecordid>A760530472</sourcerecordid><originalsourceid>FETCH-LOGICAL-c479t-d8499acb39f9a4ecccdfce373eb67d0442207942de68f581b8974c1bb1ade57f3</originalsourceid><addsrcrecordid>eNp1kc1LwzAYh4soOHR3jwUvE-zM15bmWIZzwjYP6jmk6dva2TYzaZH992abOhiaQPIenrz5JU8QXGE0ZAjHd6ta13pIEPaTIoRPgh4WlEeCIXb6W2NyHvSdWyE_RowzjnpB8gy6s2W7CReqUQXU0LRhbmy4MGlZQZhk4czocAntp7Hvocl_ShcOFsnSLG8ug7NcVQ763_tF8Dq9f5nMovnTw-MkmUeacdFGWcyEUDqlIheKgdY6yzVQTiEd8wwxRgjigpEMxnE-inEaC840TlOsMhjxnF4Eg33ftTUfHbhW1qXTUFWqAdM5iSnzxzHHzKPXR-jKdLbx6STxX0E4oYh46nZPFaoCmXaubMD5xZXFW-sK1TknEz5GI4oY3-Joj2trnLOQy7Uta2U3EiO5tSB3FuTBwiFyWZSHCMeYXGfb103_QLdi5EGM9GLkTsx_VxL6BQ5Vnhk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2937272302</pqid></control><display><type>article</type><title>Security Management for Mobile Ad Hoc Network of Networks (MANoN)</title><source>ProQuest Central UK/Ireland</source><source>Alma/SFX Local Collection</source><source>ProQuest Central</source><creator>Al-Bayatti, Ali H ; Zedan, Hussein ; Cau, Antoniuo ; Siewe, François</creator><creatorcontrib>Al-Bayatti, Ali H ; Zedan, Hussein ; Cau, Antoniuo ; Siewe, François</creatorcontrib><description>Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and flexible manner. As a result, the development of the Global Information Grid (GIG) was the key enabler for this process; hence, adding to the development of the mobile networking part of the GIG, the concept of the Mobile Ad hoc Network of Networks (MANoN) is introduced. This article proposes a novel security management algorithm achieving the three management essentials: Security Administration; Prevention and Detection; and Containment and Recovery; based on the International Telecommunication Union’s recommendation M.3400 to manage securely the future of military Network-Centric Warfare (NCW). The authors will employ Interval Temporal Logic (ITL) as a method of handling both sequential and parallel composition in flexible timely constrains, in addition, this technique will be evaluated using the Network Simulator (NS-2) to provide and check whether security requirements are met in a comprehensive manner.</description><identifier>ISSN: 1937-9412</identifier><identifier>EISSN: 1937-9404</identifier><identifier>DOI: 10.4018/jmcmc.2010103001</identifier><language>eng</language><publisher>Hershey: IGI Global</publisher><subject>Ad hoc networks ; Algorithms ; Computer information security ; Management ; Materials handling ; Military ; Military communications ; Mobile communication systems ; Network-centric warfare ; Networks ; Security management ; Temporal logic ; Wireless communication systems</subject><ispartof>International journal of mobile computing and multimedia communications, 2010-01, Vol.2 (1), p.1-19</ispartof><rights>COPYRIGHT 2010 IGI Global</rights><rights>Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c479t-d8499acb39f9a4ecccdfce373eb67d0442207942de68f581b8974c1bb1ade57f3</citedby><cites>FETCH-LOGICAL-c479t-d8499acb39f9a4ecccdfce373eb67d0442207942de68f581b8974c1bb1ade57f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2937272302?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,33745,43805,64385,64387,64389,72469</link.rule.ids></links><search><creatorcontrib>Al-Bayatti, Ali H</creatorcontrib><creatorcontrib>Zedan, Hussein</creatorcontrib><creatorcontrib>Cau, Antoniuo</creatorcontrib><creatorcontrib>Siewe, François</creatorcontrib><title>Security Management for Mobile Ad Hoc Network of Networks (MANoN)</title><title>International journal of mobile computing and multimedia communications</title><description>Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and flexible manner. As a result, the development of the Global Information Grid (GIG) was the key enabler for this process; hence, adding to the development of the mobile networking part of the GIG, the concept of the Mobile Ad hoc Network of Networks (MANoN) is introduced. This article proposes a novel security management algorithm achieving the three management essentials: Security Administration; Prevention and Detection; and Containment and Recovery; based on the International Telecommunication Union’s recommendation M.3400 to manage securely the future of military Network-Centric Warfare (NCW). The authors will employ Interval Temporal Logic (ITL) as a method of handling both sequential and parallel composition in flexible timely constrains, in addition, this technique will be evaluated using the Network Simulator (NS-2) to provide and check whether security requirements are met in a comprehensive manner.</description><subject>Ad hoc networks</subject><subject>Algorithms</subject><subject>Computer information security</subject><subject>Management</subject><subject>Materials handling</subject><subject>Military</subject><subject>Military communications</subject><subject>Mobile communication systems</subject><subject>Network-centric warfare</subject><subject>Networks</subject><subject>Security management</subject><subject>Temporal logic</subject><subject>Wireless communication systems</subject><issn>1937-9412</issn><issn>1937-9404</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>N95</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kc1LwzAYh4soOHR3jwUvE-zM15bmWIZzwjYP6jmk6dva2TYzaZH992abOhiaQPIenrz5JU8QXGE0ZAjHd6ta13pIEPaTIoRPgh4WlEeCIXb6W2NyHvSdWyE_RowzjnpB8gy6s2W7CReqUQXU0LRhbmy4MGlZQZhk4czocAntp7Hvocl_ShcOFsnSLG8ug7NcVQ763_tF8Dq9f5nMovnTw-MkmUeacdFGWcyEUDqlIheKgdY6yzVQTiEd8wwxRgjigpEMxnE-inEaC840TlOsMhjxnF4Eg33ftTUfHbhW1qXTUFWqAdM5iSnzxzHHzKPXR-jKdLbx6STxX0E4oYh46nZPFaoCmXaubMD5xZXFW-sK1TknEz5GI4oY3-Joj2trnLOQy7Uta2U3EiO5tSB3FuTBwiFyWZSHCMeYXGfb103_QLdi5EGM9GLkTsx_VxL6BQ5Vnhk</recordid><startdate>20100101</startdate><enddate>20100101</enddate><creator>Al-Bayatti, Ali H</creator><creator>Zedan, Hussein</creator><creator>Cau, Antoniuo</creator><creator>Siewe, François</creator><general>IGI Global</general><scope>AAYXX</scope><scope>CITATION</scope><scope>N95</scope><scope>7SC</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M7S</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20100101</creationdate><title>Security Management for Mobile Ad Hoc Network of Networks (MANoN)</title><author>Al-Bayatti, Ali H ; Zedan, Hussein ; Cau, Antoniuo ; Siewe, François</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c479t-d8499acb39f9a4ecccdfce373eb67d0442207942de68f581b8974c1bb1ade57f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Ad hoc networks</topic><topic>Algorithms</topic><topic>Computer information security</topic><topic>Management</topic><topic>Materials handling</topic><topic>Military</topic><topic>Military communications</topic><topic>Mobile communication systems</topic><topic>Network-centric warfare</topic><topic>Networks</topic><topic>Security management</topic><topic>Temporal logic</topic><topic>Wireless communication systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Al-Bayatti, Ali H</creatorcontrib><creatorcontrib>Zedan, Hussein</creatorcontrib><creatorcontrib>Cau, Antoniuo</creatorcontrib><creatorcontrib>Siewe, François</creatorcontrib><collection>CrossRef</collection><collection>Gale Business: Insights</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Engineering Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>International journal of mobile computing and multimedia communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al-Bayatti, Ali H</au><au>Zedan, Hussein</au><au>Cau, Antoniuo</au><au>Siewe, François</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Management for Mobile Ad Hoc Network of Networks (MANoN)</atitle><jtitle>International journal of mobile computing and multimedia communications</jtitle><date>2010-01-01</date><risdate>2010</risdate><volume>2</volume><issue>1</issue><spage>1</spage><epage>19</epage><pages>1-19</pages><issn>1937-9412</issn><eissn>1937-9404</eissn><abstract>Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and flexible manner. As a result, the development of the Global Information Grid (GIG) was the key enabler for this process; hence, adding to the development of the mobile networking part of the GIG, the concept of the Mobile Ad hoc Network of Networks (MANoN) is introduced. This article proposes a novel security management algorithm achieving the three management essentials: Security Administration; Prevention and Detection; and Containment and Recovery; based on the International Telecommunication Union’s recommendation M.3400 to manage securely the future of military Network-Centric Warfare (NCW). The authors will employ Interval Temporal Logic (ITL) as a method of handling both sequential and parallel composition in flexible timely constrains, in addition, this technique will be evaluated using the Network Simulator (NS-2) to provide and check whether security requirements are met in a comprehensive manner.</abstract><cop>Hershey</cop><pub>IGI Global</pub><doi>10.4018/jmcmc.2010103001</doi><tpages>19</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1937-9412 |
ispartof | International journal of mobile computing and multimedia communications, 2010-01, Vol.2 (1), p.1-19 |
issn | 1937-9412 1937-9404 |
language | eng |
recordid | cdi_proquest_miscellaneous_1349421714 |
source | ProQuest Central UK/Ireland; Alma/SFX Local Collection; ProQuest Central |
subjects | Ad hoc networks Algorithms Computer information security Management Materials handling Military Military communications Mobile communication systems Network-centric warfare Networks Security management Temporal logic Wireless communication systems |
title | Security Management for Mobile Ad Hoc Network of Networks (MANoN) |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T02%3A34%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Management%20for%20Mobile%20Ad%20Hoc%20Network%20of%20Networks%20(MANoN)&rft.jtitle=International%20journal%20of%20mobile%20computing%20and%20multimedia%20communications&rft.au=Al-Bayatti,%20Ali%20H&rft.date=2010-01-01&rft.volume=2&rft.issue=1&rft.spage=1&rft.epage=19&rft.pages=1-19&rft.issn=1937-9412&rft.eissn=1937-9404&rft_id=info:doi/10.4018/jmcmc.2010103001&rft_dat=%3Cgale_proqu%3EA760530472%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2937272302&rft_id=info:pmid/&rft_galeid=A760530472&rfr_iscdi=true |