Abstract
The openness and heterogeneity of next generation communication networks are now highlighting more security issues than those of traditional communication environments. Moreover users’ security requirements can often change in mobile communication environments, depending on the situation in which the user is immersed. Our objective is to define a context-aware security framework for addressing the problems of end-to-end security on behalf of end-users. Based on context data acquisition and aggregation features, the framework uses contextual graphs to define security policies encompassing actions at different layers of communication systems’ architecture, while adapting to changing circumstances.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: a context-aware security scheme for smart spaces. In: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, March 23-26, pp. 489–496 (2003)
Brezillon, P., Pasquier, L., Pomerol, J.C.: Reasoning with contextual graphs. European Journal of Operational Research 136(2), 290–298 (2002)
Brok, J., Kumar, B., Meeuwissen, E., Batteram, H.J.: Enabling New Services by Exploiting Presence and Context Information in IMS. Wiley Interscience, Hoboken (2006)
Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter Base Protocol. Request for Comments 3588 (September 2003), http://www.ietf.org/rfc/rfc3588.txt
Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A Context-Aware Security Architecture for Emerging Applications. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada, USA (December 2002)
Day, M., Sugano, H., Rosenberg, J.: A Model for Presence and Instant Messaging. Request for Comments 2778 (February 2000), http://www.ietf.org/rfc/rfc2778.txt
Dey, A.K., Abowd, G.D.: Towards a Better Understanding of Context and Context-Awareness. In: Workshop on The What, Who, Where, When, and How of Context-Awareness, as part of the 2000 Conference on Human Factors in Computing Systems, CHI 2000 (2000)
Durham, D., Boyle, J., Cohen, R., Herzog, S., Rajan, R., Sastry, A.: The COPS Protocol. Request for Comments 2748 (January 2000), http://www.ietf.org/rfc/rfc2748.txt
Handley, M., Jacobson, V.: SDP: Session Description Protocol. Request for Comments: 2327 (April 1998), http://www.ietf.org/rfc/rfc2327.txt
Handley, M., Schulzrinne, H., Schooler, E., Rosenberg, J.: SIP: Session Initiation Protocol. Request For Comment 2543 (March 1999), http://www.ietf.org/rfc/rfc2543.txt
International Telecommunication Union. ITU-T X.805 Security architecture for systems providing end-to-end communications SERIES X: Data Networks and Open System Communications – Security (2003)
Masone, C.: Role definition language (rdl): A language to describe context-aware roles. Technical report, Dartmouth College, Computer Science, Hanover, NH (2002)
Mihovska, A., Prasad, N.R.: Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN). In: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Philadelphia, USA (2007)
Mostefaoui, G.K., Brezillon, P.: Modeling context-based security policies with contextual graphs. In: The Proc. of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 28–32 (2004)
Nasser, N., Hasswa, A., Hassanein, H.: Handoffs in Fourth Generation Heterogeneous Networks. IEEE Communications Magazine (October 2006)
Poikselka, M., Mayer, G., Khartbil, H., Niemi, A.: The IMS – IP Multimedia Concepts and Services. Wiley, Chichester (2006)
Ranganathan, A., Campbell, R.H.: An Infrastructure for Context-Awareness based on First Order Logic. Personal and Ubiquitous Computing 7(6), 353–364 (2003)
Roberts, M.L., Temple, M.A., Mills, R.F., Raines, R.A.: Evolution of the air interface of cellular communications systems toward 4G realization. In: Communications Surveys & Tutorials, vol. 8(1), pp. 2–23. IEEE, Los Alamitos (First Quarter 2006)
World Wide Web Consortium, Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 1.0 (January 2004)
Wullems, C., Looi, M., Clark, A.: Towards Context-aware Security: An Authorization Architecture for Intranet Environments. In: The Proc. of the Second IEEE Annual Conference on Pervasive Computing and Communications, pp. 132–137 (2004)
Yee, G., Korba, L.: Context-aware Security Policy Agent for Mobile Internet Services. In: Proc. of the 2005 IFIP International Conference on Intelligence in Communication Systems (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Bandinelli, M., Paganelli, F., Vannuccini, G., Giuli, D. (2009). A Context-Aware Security Framework for Next Generation Mobile Networks. In: Schmidt, A.U., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04434-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-04434-2_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04433-5
Online ISBN: 978-3-642-04434-2
eBook Packages: Computer ScienceComputer Science (R0)