Abstract
Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in previous approaches, we assume an individual wireless node is vulnerable.
We present an agent-based architecture with supporting services that is proven to be adequate to detect and confine common attacks. Decisions at different levels are supported by a trust-based framework with good and bad reputation feedback while maintaining resistance to bad-mouthing attacks. We also propose a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients.
The resulting approach takes into account practical issues, such as resource limitation, bandwidth optimization, and scalability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Malagon, P., Vallejo, J., Moya, J.: Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. In: The International Conference on Emerging Security Information, Systems, and Technologies, 2007. SECUREWARE 2007, pp. 128–131 (2007)
Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: Design challenges. Trans. on Embedded Computing Sys. 3(3), 461–491 (2004)
Kocher, P., Lee, R., Mcgraw, G., Ravi, S.: Security as a new dimension in embedded system design. In: Ravi, S. (ed.) Proceedings of the 41st Design Automation Conference (DAC 2004), pp. 753–760. ACM Press, New York (2004)
Ravi, S., Raghunathan, A., Potlapally, N., Sankaradass, M.: System design methodologies for a wireless security processing platform. In: Proceedings of the 39th Conference on Design Automation, New Orleans, Louisiana, USA, June 10 - 14, 2002, pp. 777–782 (2002)
Arora, D., Raghunathan, A., Sankaradass, S.R.M., Jha, N.K., Chakradhar, S.T.: Software architecture exploration for high-performance security processing on a multiprocessor mobile soc. In: Proceedings of the 43rd Annual Conference on Design Automation, San Francisco, CA, USA, July 24-28, 2006, pp. 496–501 (2006)
Xu, K., Hong, X., Gerla, M.: Landmark routing in ad hoc networks with mobile backbones. In: Parallel Distributed Computing, pp. 110–122 (February 2003)
Bannerjee, S., Khuller, S.: A clustering scheme for hierarchical control in wireless networks. In. Proceedings of IEEE INFOCOM (2001)
Basagni, S.: Distributed clustering for ad hoc networks. In: Proceedings of the IEEE International Symposium on Parallel Architectures, Algorithms, and Networks, pp. 310–315 (June 1999)
Lin, C.R., Gerla, M.: Adaptive clustering for mobile wireless networks. IEEE Journal Selected Areas in Communications, 1265–1275 (September 1997)
Gupta, P., Kumar, P.: Capacity of wireless networks. Technical report, University of Illinois, Urbana-Champaign (1999)
Boukerch, A., Xu, L., EL-Khatib, K.: Trust-based security for wireless ad hoc and sensor networks. Comput. Commun., 11–12 (September 2007)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Mauro Conti, R.D.P., Mancini, L.V.: Ecce: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. Ad Hoc Networks 5, 49–62 (2007)
Subramanian, N., Yang, C., Zhang, W.: Securing distributed data storage and retrieval in sensor networks. Pervasive and Mobile Computing 3, 659–676 (2007)
ho Lee, K., Jeon, H., Kim, D.: Wormhole Detection Method based on Location in Wireless Ad-hoc Networks. In: New Technologies, Mobility and Security, pp. 361–372. Springer, Netherlands (2007)
Vajda, I., Buttyán, L., Dóra, L.: Statistical wormhole detection in sensor networks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 128–141. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Moya, J.M., Vallejo, J.C., Malagón, P., Araujo, Á., de Goyeneche, JM., Nieto-Taladriz, O. (2009). A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors. In: van den Berg, H., Heijenk, G., Osipov, E., Staehle, D. (eds) Wired/Wireless Internet Communications. WWIC 2009. Lecture Notes in Computer Science, vol 5546. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02118-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-02118-3_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02117-6
Online ISBN: 978-3-642-02118-3
eBook Packages: Computer ScienceComputer Science (R0)