independent measurement entities, each
independently aiming at a higher security level in
the network.
If we are able to develop intelligent and feasible
ontologies for the information gathering, we might
even learn more about the nature of security. In
today’s information technology world there is a lot
of knowledge that just has to be combined in a
suitable way to assess the overall security level, i.e.
“find the forest from the trees.” The current limited
knowledge of the nature of security is hindering us
from finding rigorous solutions to the aspects of
overall security.
Our future work will include further exploration
of component metric areas for mobile ad hoc
networks and development of ontologies for
information gathering and estimation processes. Our
initial framework of security metrics will certainly
be updated during the course of the research – we do
not know a priori the compositional hierarchy of
causalities in such a concept as security. Our future
work will also include building an experimentation
ubiquitous environment for analyzing the
measurement method presented in this paper. It will
be also possible to investigate trust establishment in
this environment. Moreover, techniques for reducing
the memory and computation resource needs of the
approach are to be investigated.
REFERENCES
Berners-Lee, T., Hendler, J., and Lassila, O., 2001. The
Semantic Web. In Scientific American, 284(5): 34-43.
Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis,
A. D., 1999. The KeyNote Trust Management System,
V 2. IETF RFC 2704, Available at: www.ietf.org
Blaze, M., Feigenbaum, J., and Lacey, J., 1996.
Decentralized Trust Management. In Proceedings of
IEEE Symposium on Security and Privacy, 164-173.
Čapkun, S., Buttyán, L. and Hubaux, J-P., 20 03. Self-
Organized Public-Key Management for Mobile Ad
Hoc Networks. In IEEE Transactions on Mobile
Computing, Vol. 2, No. 1, 52-64.
Chandrasekaran, B., Josephson, J.R., and Benjamins, V.
R., 1999. What Are Ontologies, and Why Do We
Need Them? In IEEE Intelligent Systems, Jan/Feb.,
20-26.
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas,
B., and Ylönen, T., 1999. SPKI Certificate Theory.
IETF RFC 2693, Sep. Available at: www.ietf.org
Hendler, J., Berners-Lee, T., and Miller, Er., 2002.
Integrating Applications on the Semantic Web. In
Journal of the Institute of Electrical Engineers of
Japan, Vol 122(10), October, p. 676-680.
Henning, R. (ed.), 2001. Workshop on Information
Security Scoring and Ranking. Information System
Security Attribute Quantification or Ordering.
Hubaux, J.-P., Buttyán, L., and Capkun, S., 2001. The
Quest for Security in Mobile Ad Hoc Networks. In
Proceedings of the 2
nd
ACM International Symposium
of Mobile Ad Hoc Networking and Computing
(MobiHoc), 146-155.
Internet Engineering Task Force (IETF), 2004. MANET
Working Group. Available at: www.ietf.org
ISO/IEC 21827. 2002. Information Technology – Systems
Security Engineering – Capability Maturity Model
(SSE-CMM).
Jelen, G., 2000. SSE-CMM Security Metrics. In NIST and
CSSPAB Workshop, Washington, D.C..
Jonsson, E., 2003. Dependability and Security Modelling
and Metrics, Lecture Slides, Chalmers University of
Technology, Sweden.
Kagal, L., Finin, T., and Joshi, A., 2003. A Policy
Language for a Pervasive Computing Environment. In
Proceedings of the 4
th
Int. Workshop on Policies for
Distributed Systems and Networks (POLICY’03).
Li, N., Grosof, B. N., and Feigenbaum, J., 2003.
Delegation Logic: A Logic-based Approach to
Distribution Authorization. In ACM Transactions on
Information and System Security, Vol. 6., No. 1., Feb.,
128-171.
Luo, H., Zerfos, P., Kong, J., and Zhang, L., 2002. Self-
Securing Ad Hoc Wireless Networks. In Proceedings
of the 7
th
Int. Symposium on Computers and
Communications (ISCC), 567-574.
Savola, R., 2004. Estimation of the Security Level in
Wireless E-Commerce Environment based on Ad Hoc
Networks. In Proceedings of the 5
th
European
Conference E-COMM-LINE, Bucharest, Romania,
Oct. 21-22.
U.S. Department of Defense, 1985. Trusted Computer
System Evaluation Criteria (TCSEC) “Orange Book”,
U. S. Department of Defense Standard, DoD 5200.28-
std.
Winslett, M., Yu, T., Seamons, K. E., Hess, A., Jacobson,
J., Jarvis, R., Smith, B., and Yu, L., 2002. Negotiating
Trust on the Web. In IEEE Internet Computing,
Nov/Dec, 30-37.
Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L., 2004.
Security in Mobile Ad Hoc Networks: Challenges and
Solutions. In IEEE Wireless Communications, Vol. 11,
No.1, Feb., 38-47.
Zhou, L., and Haas, Z. J., 1999. Securing Ad Hoc
Networks. In IEEE Network Magazine, Vol. 13, No. 6,
Nov/Dec, 24-30.
ICEIS 2005 - SOFTWARE AGENTS AND INTERNET COMPUTING
262