Modelling and Simulating Access Control in Wireless Ad-Hoc Networks

N A Azeez


There has been a great increase in the use of wireless networks over the years; Mobile Ad hoc Network is an example of such wireless network. It functions without any central administration and the network is made up of a collection of nodes within a radio frequency.  Security in mobile network has been an area of great research over the years mainly because most ad hoc protocols do not provide the basic security framework and services.  This paper aims at simulating access control in wireless ad-hoc networks. The objectives are to ensure that the network is not vulnerable and should also devoid of any form of malicious attack that could prevent authorized access. Two metrics (packet delivery ratio and traffic overhead) were used to measure the effectiveness and efficiency of the networks. Through a detailed simulation study, we show that the protocol is efficient and allows a trade-off between security and performance. This research focuses on designing an access control mechanism that was incorporated within ad-hoc routing protocols with the aim of adding an extra layer of security against threats in the network. The three stage-process for access control was implemented with NS-2 v 35. The nodes in the simulation were created dynamically, the movement between nodes was generated randomly and the connections between the nodes were done using Constant Bit Rate (CBR) connection which was aimed at enabling the network to mimic a real life scenario. Through different experiments and simulations done, it was observed that the access control model works and also provides a higher level of security for ad-hoc networks even when under security threats and attacks.

Full Text:



Al-Hamdani, W. (2010, October 1 - 3). Cryptography based access control in healthcare web systems. 2010 Information Security Curriculum Development Conference (InfoSecCD '10) , 66 -79.

Al-mahmud, A., & Morogan, M. (2012). Identity-based authentication and access control in wireless sensor networks. Int. J. Comput. Appl. , 41, 18 - 24.

Azeez, N. A., & Ademolu, O. (2016). CyberProtector: Identifying Compromised URLs in Electronic Mails with Bayesian Classification. 2016 International Conference Computational Science and Computational Intelligence (CSCI) (pp. 959-965). Las Vegas, NV, USA: IEEE.

Azeez, N. A., & Babatope, A. B. (2016). AANtID: an alternative approach to network intrusion detection. The Journal of Computer Science and its Applications. An International Journal of the Nigeria Computer Society , 129-143.

Azeez, N. A., & Iliyas, H. D. (2016). Implementation of a 4-tier cloud-based architecture for collaborative health care delivery. Nigerian Journal of Technological Development , 13 (1), 17-25.

Azeez, N. A., & Venter, I. M. (2013). Towards ensuring scalability, interoperability and efficient access control in a multi-domain grid-based environment. SAIEE Africa Research Journal , 104 (2), 54-68.

Azeez, N. A., Iyamu, T., & Venter, I. M. (2011). Grid security loopholes with proposed countermeasures. In E. Gelenbe, R. Lent, & G. Sakellari (Ed.), 26th International Symposium on Computer and Information Sciences (pp. 411-418). London: Springer.

Azeez, N.A., & Lasisi, A. A. (2016). Empirical and Statistical Evaluation of the Effectiveness of Four Lossless Data Compression Algorithms. Nigerian Journal of Technological Development, Vol. 13, NO. 2, December 2016, 64-73.

Bender, A., Katz, J., & Morselli, R. (2008). Ring signatures: Stronger definitions, and constructions without random oracles. J. Cryptol.

Chase, M., & Chow, S. (2009, November 9 – 13). Improving privacy and security in multi-authority attribute-based encryption. 16th ACM Conference on Computer and Communications Security.

Ferraiolo, D., & Kuhn, D. (1992, October 13 - 16). Role-based access controls. 15th National Computer Security Conference .

Ferreria, A., Correia, R., Monterio, H., Brito, M., & Antunes, L. (2011, June 27 - 30). Usable access control policy and model for healthcare. 2011 24th International Symposium on Computer-Based Medical Systems (CBMS) , 1 - 6.

Garcia-Morchon, O., & Wehrle, K. (2010, June 9 - 11). Modular context-aware access control for medical sensor networks. 15th ACM Symposium on Access Control Models and Technologies (SACMAT '10) , 129 - 138.

Gentry, C. (2006). Handbook of information Security. John Wiley and Sons: Bakersfield, CA, USA.

Ghani, N., Selamat, H., & Sidek, Z. (2012). Analysis of existing privacy-aware access control for e-commerce application. 12, 1- 5.

Gorasia, N., Srikanth, R., Doshi, N., & Rupareliya, J. (2016). Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption. In K. Mishra (Ed.), Proceedings of International Conference on Communication, Computing and Virtualization (ICCCV) 2016 (pp. Proceedings of International Conference on Communication, Computing and Virtualization (ICCCV) 2016). Elsevier.

Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM conference on computer and communications security (pp. 89-98). Alexandria, Virginia, USA.

He, D., Bu, J., Zhu, S., Chen, C., & Chan, S. (2011). Distributed access control with privacy support in wireless sensor networks. IEEE Trans. Wirel. Commun.

Hur, J. (2011). Fine-grained data access control for distributed sensor networks. Wireless. Network.

Lampson, B. (1971, January). Protection. 5th Princeton Conference on Information Sciences and Systems .

Morchon, O., & Wehrle, K. (2010, 29 March - 2 April). Efficient and context-aware access control for pervasive medical sensor networks. 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) .

Nureni , A. A., & Irwin, B. (2010). Cyber security: Challenges and the way forward. Computer Science & Telecommunications, 29, 56-69.

Ruj, S., Nayak, A., & Stojmenovic, I. (2011, May 16 - 20). Distributed fine-grained access control in wireless sensor networks. 2011 IEEE International Parallel and Distributed Processing Symposium (IPDPS) , 352 - 362.

Samarati, P., & Vimercati, S. (2001). Access control: Policies, models and mechanisms. Foundation of Security Analysis and Design , 2171, 137 - 196.

Sandhu, R., & Munawer, Q. (1998, October 22 - 23). How to do discretionary access control using roles. 3rd ACM Workshop on Role-Based Access Control .

Sen, J. (2009). A survey on wireless sensor network security. International Journal of Communication Network Information Security , 1, 55 - 78.

Shamir, A. (1985). Identity-based cryptosystems and signature schemes. Advances in Cryptology , 196, 47 - 53.

Wang, H., Sheng, B., & Li, Q. (2006). Elliptic curve cryptography based access control in sensor networks. Int. J. Secur. Netw. , 1, 127 - 137.

Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Community Survey , 8, 20 - 23.

Wang, Y., Wong, D., & Huang, L. (2011, June 5 - 9). A one-pass key establishment protocol for anonymous wireless roaming with PFS. 2011 IEEE International Conference on Communications (ICC) , 1 - 5.

Ye, F., Luo, H., Cheng, J., Lu, S., & Zhang, L. (2002, September 23 – 28). A two-tier data dissemination model for large-scale wireless sensor networks. 8th Annual International Conference on Mobile Computing and Networking (MobiCom’02) , 148 – 159.

Yu, S., Ren, k., & Lou, K. (2011). Fdac: Toward fine-grained distribution data access control in wireless sensor networks. IEEE Trans. Parallel Distribution System , 22, 673 - 686.

Zhao, G., & Chadwick, D. (2008, June 23 - 25). On the modeling of bell-lapadula security policies using RBAC. 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE '08) , 257 - 262.

Zhou, Y., Zhang, Y., & Fang, Y. (2007). Access control in wireless sensor networks. Ad Hoc Network.

Zhu, Y., Keoh, S., Sloman, M., & Lupu, E. (2009). A lightweight policy system for body sensor network. IEEE Trans. Netw. Serv. Manag , 6, 137 - 148.

Zhu, Y., Keoh, S., Sloman, M., Lupu, E., Zhang, Y., Dulay, N., et al. (2008, 29 September - 2 October). Finger: An effective policy system for body sensor networks. 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems , 428 - 433.


  • There are currently no refbacks.