Fednets: P2P Cooperation of Personal Networks Access Control and Management Framework

Fednets: P2P Cooperation of Personal Networks Access Control and Management Framework

Malohat Ibrohimovna, Sonia Heemstra de Groot
DOI: 10.4018/978-1-4666-2136-7.ch025
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

A personal network (PN) is a network of a user’s personal devices and services, cooperating with each other independently of their geographical location to provide ubiquitous services to the user. PNs can be the producers and consumers of the services, content and resources. They can also export the subsets of their personal resources and services to other PNs. In such cases, PNs may form a group-oriented secure network called a Federation of Personal Networks (Fednet). A Fednet is a temporal, ad-hoc opportunity or purpose driven network of PNs, in which PNs collaborate with each other to share resources and services in a peer-to-peer manner. A Fednet is a pervasive and ubiquitous computing technology that enables the users to enjoy cooperation and promises exciting opportunities for different applications in various fields, such as education, healthcare, entertainment, business and emergency.In this chapter, the authors discuss PN technology expanding on the concept of Fednet. They provide example scenarios for Fednets, showing their potential impact to the quality of life of their users. Furthermore, they present the architecture and lifecycle of a Fednet. They explain the interactions of the main architectural components during its lifecycle and present a framework for the secure access control and management for a Fednet. The framework provides a controlled collaboration of PNs, where each PN controls the access to its resources and services. Finally, the authors provide a brief overview of some of the existing resource sharing group-oriented networks related to Fednets.
Chapter Preview
Top

1. Introduction

Recent developments in device technologies resulted in various personal digital devices equipped with networking capabilities that enable them to communicate with each other, forming a person-centric network. A personal network (PN) (Niemegeers & Heemstra de Groot, 2003) is an example of a person-centric network. It is a network of a user’s personal digital devices that cooperate with each other regardless of their geographical location. Some of the devices in the PN can be located at home, others in a user’s office or car, and some of the devices the user can carry with her/him. Based on their location, personal devices can be grouped into clusters. A simple PN consists of a local cluster around the user. The local cluster can be extended with remote clusters, such as an office cluster, home cluster and car cluster by means of interconnecting infrastructures. Together they form a distributed personal environment of a user. This is illustrated in Figure 1.

Figure 1.

Example of a personal network

978-1-4666-2136-7.ch025.f01

The concept of a personal network and its design challenges have inspired many projects that investigated different aspects of PNs, such as the Dutch projects Freeband PNP2008 (2004-2008) and QoS for PNs at home (2004-2008), and the European IST projects Magnet and Magnet Beyond (2006-2008). The European project PacWoman (2003) has research outcomes useful for the research on personal networking.

Personal devices of the user in the PN, communicating with each other independently of their geographic location, can provide ubiquitous services to the user, such as remote babysitting, remote control and monitoring of one's house, content sharing and conferencing services. In some situations it is beneficial and even crucial to share these personal resources and services with others to achieve a common goal that otherwise, by means of a single PN, would not be possible. Examples are: sharing digital media for business or entertainment, sharing sensor information from different sources for rescue of people in a disaster relief operation or getting real-time information from devices that belong to other people in healthcare applications. To achieve a common goal, different persons’ PNs can federate into a group-oriented network. Then a personal network that is tailored to the needs of one person will grow into a network of a group of persons who share a subset of their resources and services with each other.

The idea of group communication of personal networks, the so-called Federation of Personal Networks (Fednet) for sharing personal resources to achieve a common goal, was first introduced by Niemegeers & Heemstra de Groot (2005). A Fednet is a temporal, ad-hoc opportunity or purpose driven network of PNs. PNs in a Fednet cooperate and share resources in a peer-to-peer manner, i.e. PNs are ’peers’ to each other and have equal responsibilities and capabilities in providing/consuming the services. Therefore we consider Fednets a P2P network of personal networks.

Research in Fednets is still in its infancy. The main challenge in sharing personal resources in Fednets is the control of the access to the shared resources. Up till now, little attention has been paid to the design of the access control mechanisms for Fednets. The major issues in the access control in Fednets are: protecting the privacy sensitive information such as PN’s structure and services, and keeping the control over personal resources and services; high dynamism in availability of personal resources and services; and changing access rights of Fednet members depending not only on their behavior but also on the goals of the Fednet and total availability of resources.

Different aspects of PNs and their federations have been studied in the European projects Magnet and Magnet Beyond (2006-2004). Some of the achievements of the projects include new optimized air interfaces for low and high data rates, self-organization in PNs, new routing and mobility protocols for PNs and their federations and business models. Although federations have received some attention, the issues related to the access control in Fednets were considered on a conceptual level. No detailed studies were done to compose a consistent and complete solution. In this chapter, we propose a framework for secure access control and management for a Fednet (ACM framework) as one of the solutions to realize Fednets.

Complete Chapter List

Search this Book:
Reset