Skip to main content

A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors

  • Conference paper
Wired/Wireless Internet Communications (WWIC 2009)

Abstract

Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in previous approaches, we assume an individual wireless node is vulnerable.

We present an agent-based architecture with supporting services that is proven to be adequate to detect and confine common attacks. Decisions at different levels are supported by a trust-based framework with good and bad reputation feedback while maintaining resistance to bad-mouthing attacks. We also propose a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients.

The resulting approach takes into account practical issues, such as resource limitation, bandwidth optimization, and scalability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Malagon, P., Vallejo, J., Moya, J.: Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. In: The International Conference on Emerging Security Information, Systems, and Technologies, 2007. SECUREWARE 2007, pp. 128–131 (2007)

    Google Scholar 

  2. Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: Design challenges. Trans. on Embedded Computing Sys. 3(3), 461–491 (2004)

    Article  Google Scholar 

  3. Kocher, P., Lee, R., Mcgraw, G., Ravi, S.: Security as a new dimension in embedded system design. In: Ravi, S. (ed.) Proceedings of the 41st Design Automation Conference (DAC 2004), pp. 753–760. ACM Press, New York (2004)

    Google Scholar 

  4. Ravi, S., Raghunathan, A., Potlapally, N., Sankaradass, M.: System design methodologies for a wireless security processing platform. In: Proceedings of the 39th Conference on Design Automation, New Orleans, Louisiana, USA, June 10 - 14, 2002, pp. 777–782 (2002)

    Google Scholar 

  5. Arora, D., Raghunathan, A., Sankaradass, S.R.M., Jha, N.K., Chakradhar, S.T.: Software architecture exploration for high-performance security processing on a multiprocessor mobile soc. In: Proceedings of the 43rd Annual Conference on Design Automation, San Francisco, CA, USA, July 24-28, 2006, pp. 496–501 (2006)

    Google Scholar 

  6. Xu, K., Hong, X., Gerla, M.: Landmark routing in ad hoc networks with mobile backbones. In: Parallel Distributed Computing, pp. 110–122 (February 2003)

    Google Scholar 

  7. Bannerjee, S., Khuller, S.: A clustering scheme for hierarchical control in wireless networks. In. Proceedings of IEEE INFOCOM (2001)

    Google Scholar 

  8. Basagni, S.: Distributed clustering for ad hoc networks. In: Proceedings of the IEEE International Symposium on Parallel Architectures, Algorithms, and Networks, pp. 310–315 (June 1999)

    Google Scholar 

  9. Lin, C.R., Gerla, M.: Adaptive clustering for mobile wireless networks. IEEE Journal Selected Areas in Communications, 1265–1275 (September 1997)

    Google Scholar 

  10. Gupta, P., Kumar, P.: Capacity of wireless networks. Technical report, University of Illinois, Urbana-Champaign (1999)

    Google Scholar 

  11. Boukerch, A., Xu, L., EL-Khatib, K.: Trust-based security for wireless ad hoc and sensor networks. Comput. Commun., 11–12 (September 2007)

    Google Scholar 

  12. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  13. Mauro Conti, R.D.P., Mancini, L.V.: Ecce: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. Ad Hoc Networks 5, 49–62 (2007)

    Article  Google Scholar 

  14. Subramanian, N., Yang, C., Zhang, W.: Securing distributed data storage and retrieval in sensor networks. Pervasive and Mobile Computing 3, 659–676 (2007)

    Article  Google Scholar 

  15. ho Lee, K., Jeon, H., Kim, D.: Wormhole Detection Method based on Location in Wireless Ad-hoc Networks. In: New Technologies, Mobility and Security, pp. 361–372. Springer, Netherlands (2007)

    Chapter  Google Scholar 

  16. Vajda, I., Buttyán, L., Dóra, L.: Statistical wormhole detection in sensor networks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 128–141. Springer, Heidelberg (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Moya, J.M., Vallejo, J.C., Malagón, P., Araujo, Á., de Goyeneche, JM., Nieto-Taladriz, O. (2009). A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors. In: van den Berg, H., Heijenk, G., Osipov, E., Staehle, D. (eds) Wired/Wireless Internet Communications. WWIC 2009. Lecture Notes in Computer Science, vol 5546. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02118-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02118-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02117-6

  • Online ISBN: 978-3-642-02118-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics