Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Lightweight Approach for Policy-Based Messaging

  • Conference paper
  • First Online:
Evolutionary Computing and Mobile Sustainable Networks

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 53))

  • 1128 Accesses

Abstract

The popularity of Resource-Constrained Networks (RCNs) is increasing rapidly in value, volume, velocity, variety, and veracity. The limited battery power and verbosity of messages are the major limiting factors in the constrained wireless mobile environment. Hence, devising a standard that is adaptive to the limitations of the present-day wireless mobile environment is crucial for the emerging generations of constrained wireless mobile devices; it is also expected to accelerate the penetration of wireless mobile technologies to the underprivileged class of users. The eXtensible Markup Language (XML) is the natural standard for messaging across heterogeneous types of mobile devices. But it is not suitable in the wireless mobile environment, due to the increased storage and processing requirements needed. This work presents a lightweight Policy-Based Messaging (PBM) mechanism for trusted transmission of information that can be used especially in Resource-Constrained Networks (RCNs). The work is based on a data format which is less verbose. The data format is derived from the YAML Aint Markup Language (YAML), a lightweight data serialization language. Proposals include measures to define policy assertions and a two-level mechanism to make sure trusted transmission of information. The performance analysis indicates an advantage over the existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Michael MP (2005) Energy awareness for mobile devices, research seminar on energy awareness. University of Helsinki

    Google Scholar 

  2. Ravi P, Raghunathan N (2006) Heterogeneous grid computing for energy constrained mobile device. IEEE Trans Mob Comput V:128–143

    Google Scholar 

  3. Haleem PPA, Sebastian MP (2009) An efficient approach for thinning of wireless mobile messages. ICICI Express Lett III:99–105

    Google Scholar 

  4. Haleem PPA, Sebastian MP (2008) An alternative approach for slicing down the message size and enhancing the security in wireless mobile network. Mediterr J Comput Netw V:148–149

    Google Scholar 

  5. Haleem PPA, Sebastian MP (2009) Optimizing message verbosity and energy consumption in secured wireless mobile networks. Int J Mob Comput Multimed Commun (IJMCMC) I:22–35

    Google Scholar 

  6. Abdul Haleem PP, Sebastian MP (2012) An energy conserving approach for data formatting and trusted data exchange in resource constrained networks. Knowl Inf Syst 32(3):559–587 (Springer, London). https://doi.org/10.1007/s10115-011-0450-0, Print ISN: 0219-1377

  7. Benameur FAK, Fenet S (2008) XML rewriting attacks: existing solutions and their limitations. In: IADIS international conference on applied computing 2008, Algarve, Portugal, IADIS Press 2008, vol. abs/0812.4181

    Google Scholar 

  8. Eggenberger M, Prakash N, Matsumoto K, Thurmond D (2009) Policy based messaging framework. Lecture notes in computer science, vol 4749. Springer Berlin, Heidelberg, pp. 497–505

    Google Scholar 

  9. Haleem PPA, Sebastian MP (2014) An alternative approach for XML messaging. Int J Adv Res III:251–294. ISSN 2320-5407

    Google Scholar 

  10. Bartel M, Boyer J, Fox B, LaMacchia B, Simon B (2008) XML signature syntax and processing (second edition), W3C Recommendation. http://www.w3.org/TR/xmldsig-core/

  11. Eggenberger M, Prakash N, Matsumoto K, Thurmond D (2007) Policy based messaging framework. In: ICSOC ‘07: proceedings of the 5th international conference on service-oriented computing. Springer, Berlin, Heidelberg, pp 497–505

    Google Scholar 

  12. Della-Libera G, Gudgin M, Hallam-Baker P, Hondo M, Granqvist H, Kaler CM, McIntosh M, Nadalin, Nagaratnam N, Philpott R, Prafullchandra, Shewchuk, Walter, Zolfonoon R (2005) Web services security policy language (ws-security policy). http://specs.xmlsoap.org/ws/2005/07/securitypolicy/ws-securitypolicy.pdf

  13. Rahaman MA, Rits M, Schaad A (2006) An inline approach for secure SOAP requests and early validation. In: OWASP’06: proceedings of the OWASP Europe 2006 conference. OWASP, pp 19–33

    Google Scholar 

  14. Bhargavan K, Fournet C, Gordon AD, Shea GO (2005) An advisor for web services security policies. In: SWS ‘05: proceedings of the 2005 workshop on Secure web services. ACM, New York, NY, USA, pp 1–9

    Google Scholar 

  15. Sinham SK, Benameur A (2008) A formal solution to rewriting attacks on SOAP messages. In: SWS ‘08: proceedings of the 2008 ACM workshop on Secure web services. ACM, New York, NY, USA, pp 53–60

    Google Scholar 

  16. Rahaman MA, Schaad A (2007) SOAP-based secure conversation and collaboration. In: ICWS 2007: proceedings of the 2007 IEEE international conference on web services. IEEE Computer Society, pp 471–480

    Google Scholar 

  17. Gajek S, Liao J, Schwenk A (2007) Breaking and fixing the inline approach. In: SWS ‘07: proceedings of the 2007 ACM workshop on secure web services. ACM, New York, NY, USA, pp 37–43

    Google Scholar 

  18. Lang B, Zhao N, Ge K, Chen K (2008) An XACML policy generating method based on policy view. In: ICPCA 2008: proceedings of the 2008 third international conference on pervasive computing and applications. IEEE, pp 295–301

    Google Scholar 

  19. Grand GL, Springinsfeld F, Riguidel M (2003) Policy based management for critical infrastructure protection. In: INFORMATIK 2003: proceedings of the first international conference on communities and technologies. GI, Gesellschaft fur Informatik, Bonn, pp 67–78

    Google Scholar 

  20. Matthys N, Joosen W (2008) Towards policy-based management of sensor networks. In: MidSens ‘08: proceedings of the 3rd international workshop on middleware for sensor networks. ACM, New York, NY, USA, pp 13–18

    Google Scholar 

  21. Parducci, Lockhart, Levinson, McRae: OASIS extensible access markup language, OASIS (2005). http://www.oasis-open.org/committees/tc/home.php/wg/abbrev/xacml

  22. Security assertion markup language (SAML), XML Cover Pages (2008). http://xml.coverpages.org/saml.html

  23. Enterprise privacy authorization language (EPAL 1.2), W3C (2003). http://www.w3.org/Submission/2003/SUBM-EPAL-20031110/#Introduction

  24. Liu AX, Chen F, Hwang J, Xie T (2008) Xengine: a fast and scalable XACML policy evaluation engine. In: SIGMETRICS ‘08: proceedings of the 2008 ACM SIGMETRICS international conference on measurement and modeling of computer systems. ACM, New York, NY, USA, pp 265–276

    Google Scholar 

  25. Mordore Intelligence, Wireless Sensors Network Market—growth, trends, and forecast (2019–2024). https://www.mordorintelligence.com/industry-reports/wireless-sensor-networks-market

  26. Baquero Merino A (2014) Coast services: achieving service customization and policy-based differential access in personal information systems, Ph.D. dissertation. University of California, Irvine

    Google Scholar 

  27. Box D, Hondo M, Kaler C, Maruyama H, Nadalin A, Nagaratnam N, Patrick P, von Riegen, Shewchuk J (2003) Web services policy assertions language (ws-policy assertions). http://xml.coverpages.org/ws-policyassertionsV11.pdf

  28. Nadalin A, Kaler C, Hallam-Baker P, Monzillo R (2004) Web services security: SOAP message security 1.0 (ws-security 2004), OASIS. http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0.pdf

Download references

Acknowledgments

The author of this paper would like to thank University Grants Commission SWRO Bangalore for sponsoring this work (1646-MRP-/14-15/KLCA028/UGC-SWRO).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. P. Abdul Haleem .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abdul Haleem, P.P. (2021). A Lightweight Approach for Policy-Based Messaging. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5258-8_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5257-1

  • Online ISBN: 978-981-15-5258-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics