A Comprehensive Analysis of MAC Enhancements for Leveraging Distributed MAC

نویسندگان

  • Shahbaz khan
  • Muhammad Amin
  • Muhammad Nauman
  • Tamleek Ali
چکیده

Increased dependability of users, businesses and government on computing systems for research and computations on sensitive data raises serious issues regarding security. Operating systems conventionally provide Discretionary Access Control (DAC, superuser logic) to maintain security. Malicious users and applications are major threats to organizations and DAC seriously fails to address the required level of security. Former research has proven that enforcement of Mandatory Access Control (MAC, security labels/contexts for subjects and objects) restricts the malicious agents to their own domain, thus eliminating risk of damage it can cause to rest of the system and data. MAC implementations depend upon access control mechanisms. These mechanisms are added to operating systems as kernel enhancements. There are four prominent kernel enhancements: RSBAC, SELinux, GRSecurity and AppArmor. This paper assesses and reviews the differences in their implementation and enforcement techniques to achieve their similar goals and then compares their effectiveness. We give special attention to the implementation details and network labeling, in order to evaluate and understand this underlying layer of security. Our research objective is to propose a framework for Distributed MAC (DMAC), which depends on a clear perception of the architecture, internals and features of these enhancements.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

Game Theory based Energy Efficient Hybrid MAC Protocol for Lifetime Enhancement of Wireless Sensor Network

Wireless Sensor Networks (WSNs) comprising of tiny, power-constrained nodes are getting very popular due to their potential uses in wide applications like monitoring of environmental conditions, various military and civilian applications. The critical issue in the node is energy consumption since it is operated using battery, therefore its lifetime should be maximized for effective utilization ...

متن کامل

Evaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks

The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a new MAC protocol for wireless ad hoc networks using directional ant...

متن کامل

Modeling and Performance Evaluation of Energy Consumption in S-MAC Protocol Using Generalized Stochastic Petri Nets

One of the features of wireless sensor networks is that the nodes in this network have limited power sources. Therefore, assessment of energy consumption in these networks is very important. What has been common practice has been the use of traditional simulators to evaluate the energy consumption of the nodes in these networks. Simulators often have problems such as fluctuating output values i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008