Optimizing resource and data security in shared sensor networks

被引:2
作者
Huygens, Christophe [1 ]
Matthys, Nelson [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Dept Comp Sci, IBBT DistriNet, B-3001 Heverlee, Belgium
关键词
sensor network; security; monitor; policy; aspect oriented; MIDDLEWARE;
D O I
10.1002/sec.342
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A growing number of deployments of wireless sensor networks (WSNs) position the nodes as multipurpose albeit limited platforms. These platforms offer services to a set of applications of different owners. This view introduces security problems complementary to protection against outsiders requiring mechanisms beyond the existing physical, base crypto and network-level protection. Limited trust in the different applications mandates a security solution providing granular control over resources and data. Because of the constrained nature of network-embedded systems, transferring solutions from the distributed systems domain to the embedded system requires optimization. Distributed monitors can provide adequate security but must be concise and controllable by lightweight run-time artifacts as well as be deployed only where needed. Presented research consists of an operational model that inserts controls by instrumentation of local or remote interaction in the resource-rich back end, subsequently enforcing control at the nodes by using scaled down policy engines. The selective injection is achieved through aspect-oriented techniques. The solution is demonstrated for two paradigms encountered when building WSN applications, thus achieving local resource protection and protection of distributed event-based data flow. The costs and benefits of the selective injection approach are validated and quantified through a river monitoring case and associated simulation experiments. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:149 / 165
页数:17
相关论文
共 30 条
[1]  
Anderson J., 1972, Computer security technology planning study
[2]  
[Anonymous], P 7 INT C ENT DISTR
[3]  
[Anonymous], 4 WORKSH PROGR LANG
[4]  
[Anonymous], 1 INT C DIG SOC ICDS
[5]  
[Anonymous], 2006, SECURITY DISTRIBUTED
[6]  
[Anonymous], 2007 INT C COMP SYST
[7]  
[Anonymous], 2 INT WORKSH MIDDL S
[8]  
[Anonymous], 2002, Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, WSNA'02
[9]  
Bischoff U., 2007, P 2 INT WORFAHOP MID, P1
[10]   The RUNES middleware for networked embedded systems and its application in a disaster management scenario [J].
Costa, Paolo ;
Coulson, Geoff ;
Gold, Richard ;
Lad, Manish ;
Mascolo, Cecilia ;
Mottola, Luca ;
Picco, Gian Pietro ;
Sivaharan, Thirunavukkarasu ;
Weerasinghe, Nirmal ;
Zachariadis, Stefanos .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, :69-+