International Scholarly Research Notices / 2013 / Article / Tab 5

Review Article

Comparison of Adaptive Information Security Approaches

Table 5

Data for comparison framework.


Object to adaptKey agreement algorithm
Adaptation timingStart-up time adaptation, that is, at the beginning of each communication session. Considering proactive/reactive aspect is not applicable for start-up time adaptation.
Monitoring and analysesMonitors: location (scenario/scene) and device’s capability. It is assumed that particular attacks are not relevant in certain places, that is, analysed beforehand.
Planning and executionThe used key agreement algorithm depends on location and constraints of the device, that is, context information from the CaSM. The actions, which will be performed in different situations, are selected beforehand (hard coded actions), that is, static planning.
KnowledgeKnowledge source is not described.
Self-propertiesContext awareness: location and device constraints.

AttributesConfidentiality and integrity during the communication.
MechanismsKey agreement algorithm
One-, two-, and three-pass EC-MQW
Protected assetData in communication channel.
ThreatsThreats for the communication confidentiality and integrity.

ArchitectureCaSM (Context-aware Security Manager) implemented as a layer between a user’s application and security protocol. Architecture for the adaptation loop is not described.
ExtensibilityThe approach concentrates on key agreement with the specific crypto system. However, CaSM can be also applied to adapt to other security mechanisms.
FlexibilityThe approach is not coupled to specific environment or usage scenario.
ReusabilityThe CaSM component (layer) can be reused in different applications.
MaturityThe approach is not validated. In addition, the paper, which presents the approach, is the only available information source. Hence, guidelines how to implement the adaptation approach is not available. There is not a community behind the approach.

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.