
 
independent measurement entities, each 
independently aiming at a higher security level in 
the network. 
If we are able to develop intelligent and feasible 
ontologies for the information gathering, we might 
even learn more about the nature of security. In 
today’s information technology world there is a lot 
of knowledge that just has to be combined in a 
suitable way to assess the overall security level, i.e. 
“find the forest from the trees.” The current limited 
knowledge of the nature of security is hindering us 
from finding rigorous solutions to the aspects of 
overall security. 
Our future work will include further exploration 
of component metric areas for mobile ad hoc 
networks and development of ontologies for 
information gathering and estimation processes. Our 
initial framework of security metrics will certainly 
be updated during the course of the research – we do 
not know a priori the compositional hierarchy of 
causalities in such a concept as security. Our future 
work will also include building an experimentation 
ubiquitous environment for analyzing the 
measurement method presented in this paper. It will 
be also possible to investigate trust establishment in 
this environment. Moreover, techniques for reducing 
the memory and computation resource needs of the 
approach are to be investigated. 
REFERENCES 
Berners-Lee, T., Hendler, J., and Lassila, O., 2001. The 
Semantic Web. In Scientific American, 284(5): 34-43. 
Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, 
A. D., 1999. The KeyNote Trust Management System, 
V 2. IETF RFC 2704, Available at: www.ietf.org 
Blaze, M., Feigenbaum, J., and Lacey, J., 1996. 
Decentralized Trust Management. In Proceedings of 
IEEE Symposium on Security and Privacy, 164-173. 
Čapkun, S., Buttyán, L. and Hubaux, J-P., 20 03. Self-
Organized Public-Key Management for Mobile Ad 
Hoc Networks. In IEEE Transactions on Mobile 
Computing, Vol. 2, No. 1, 52-64. 
Chandrasekaran, B., Josephson, J.R., and Benjamins, V. 
R., 1999. What Are Ontologies, and Why Do We 
Need Them? In IEEE Intelligent Systems, Jan/Feb., 
20-26. 
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, 
B., and Ylönen, T., 1999. SPKI Certificate Theory. 
IETF RFC 2693, Sep. Available at: www.ietf.org 
Hendler, J., Berners-Lee, T., and Miller, Er., 2002. 
Integrating Applications on the Semantic Web. In 
Journal of the Institute of Electrical Engineers of 
Japan, Vol 122(10), October, p. 676-680. 
Henning, R. (ed.), 2001. Workshop on Information 
Security Scoring and Ranking. Information System 
Security Attribute Quantification or Ordering. 
Hubaux, J.-P., Buttyán, L., and Capkun, S., 2001. The 
Quest for Security in Mobile Ad Hoc Networks. In 
Proceedings of the 2
nd
 ACM International Symposium 
of Mobile Ad Hoc Networking and Computing 
(MobiHoc), 146-155. 
Internet Engineering Task Force (IETF), 2004. MANET 
Working Group. Available at: www.ietf.org 
ISO/IEC 21827. 2002. Information Technology – Systems 
Security Engineering – Capability Maturity Model 
(SSE-CMM). 
Jelen, G., 2000. SSE-CMM Security Metrics. In NIST and 
CSSPAB Workshop, Washington, D.C.. 
Jonsson, E., 2003. Dependability and Security Modelling 
and Metrics, Lecture Slides, Chalmers University of 
Technology, Sweden. 
Kagal, L., Finin, T., and Joshi, A., 2003. A Policy 
Language for a Pervasive Computing Environment. In 
Proceedings of the 4
th
 Int. Workshop on Policies for 
Distributed Systems and Networks (POLICY’03). 
Li, N., Grosof, B. N., and Feigenbaum, J., 2003. 
Delegation Logic: A Logic-based Approach to 
Distribution Authorization. In ACM Transactions on 
Information and System Security, Vol. 6., No. 1., Feb., 
128-171. 
Luo, H., Zerfos, P., Kong, J., and Zhang, L., 2002. Self-
Securing Ad Hoc Wireless Networks. In Proceedings 
of the 7
th
 Int. Symposium on Computers and 
Communications (ISCC), 567-574. 
Savola, R., 2004. Estimation of the Security Level in 
Wireless E-Commerce Environment based on Ad Hoc 
Networks. In Proceedings of the 5
th
 European 
Conference E-COMM-LINE, Bucharest, Romania, 
Oct. 21-22.  
U.S. Department of Defense, 1985. Trusted Computer 
System Evaluation Criteria (TCSEC) “Orange Book”, 
U. S. Department of Defense Standard, DoD 5200.28-
std. 
Winslett, M., Yu, T., Seamons, K. E., Hess, A., Jacobson, 
J., Jarvis, R., Smith, B., and Yu, L., 2002. Negotiating 
Trust on the Web. In IEEE Internet Computing, 
Nov/Dec, 30-37. 
Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L., 2004. 
Security in Mobile Ad Hoc Networks: Challenges and 
Solutions. In IEEE Wireless Communications, Vol. 11, 
No.1, Feb., 38-47. 
Zhou, L., and Haas, Z. J., 1999. Securing Ad Hoc 
Networks. In IEEE Network Magazine, Vol. 13, No. 6, 
Nov/Dec, 24-30. 
 
ICEIS 2005 - SOFTWARE AGENTS AND INTERNET COMPUTING
262