Multimedia Tools and Applications

, Volume 76, Issue 19, pp 20027–20047 | Cite as

A priority for WSN in ubiquitous environment: multimedia security requirements

  • Hwa-Young JeongEmail author


With the rapid expansion of the human-centric ubiquitous environment, wireless sensor networks (WSN) will continue to be part of our everyday life and increase the amount and the type of data generated and transmitted by the WSN. As sensors become more essential in our daily life, the data from the sensors will become more private and need to be handled more sensitively. Therefore, the security of not only the data transmission between sensor nodes, but also the software system handling the data from sensor nodes will become more important. In this study, I concentrated on the security characteristics of the overall application systems in WSNs and derived the security attributes from the security requirements and standards of the existing network-based software systems. In the software development process, security must be considered throughout the whole process and, according to the applications the priority of each security attribute can be changed. I demonstrated the relative priority change in a web-based system and a WSN application system with an Analytic Hierarchy Process. The evaluation results showed that the difference of the relative priority of the security attributes in each sample system results not from the difference between the existing network-based system and the WSN but the type of the application. Therefore, the Multimedia security requirements and standards of the existing network-based software development process can be applied to the WSN application system through proper selection and modification.


Wireless sensor networks Human-centric environment Ubiquitous computing Multimedia security attributes Multimedia security requirements Relative priority Analytic hierarchy process 


  1. 1.
    Alcaraz C, Roman R, Najera P, Lopez J (2013) Security of industrial sensor network-based remote substations in the context of the internet of things. Ad Hoc Netw 11:1091–1104CrossRefGoogle Scholar
  2. 2.
    Brodkin J (2008) Gartner: Seven cloud-computing security risks. Info world, viewed 13 March 2009, <,1>
  3. 3.
    Carman DW, Krus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security. Technical Report 00–010, NAI Labs, Network Associates, Inc., Glenwood, MDGoogle Scholar
  4. 4.
    Castillo-Effen M, Quintela DH, Jordan R, Westhoff W, Moreno W (2004) Wireless sensor networks for flash-flood alerting. in: Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits, and Systems, Dominican RepublicGoogle Scholar
  5. 5.
    Claycomb WR (2011) Dongwan shin, a novel node level security policy framework for wireless sensor networks. J Netw Comput Appl 34:418–428CrossRefGoogle Scholar
  6. 6.
    Dlamini MT, Eloff MM, Eloff JHP (2009) Internet of people, things and services – the convergence of security, trust and privacy.Google Scholar
  7. 7.
    EL Yamany HF, Capretz MAM, Allison DS (2010) Intelligent security and access control framework for service-oriented architecture. Inf Softw Technol 52:220–236CrossRefGoogle Scholar
  8. 8.
    Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security, ACM Press, p 41–47Google Scholar
  9. 9.
    Fayed NS, Daydamoni EM, Atwan A (2012) Efficient combined security system for wireless sensor network. Egypt Inform J 13:185–190CrossRefGoogle Scholar
  10. 10.
    Gao T, Greenspan D, Welsh M, Juang RR, Alm A (2005) Vital signs monitoring and patient tracking over a wireless network. in: Proceedings of the 27th IEEE EMBS Annual International ConferenceGoogle Scholar
  11. 11.
    Gutierrez C, Rosado DG, Fernandez-Medina E (2009) The practical application of a process for eliciting and designing security in web service systems. Inf Softw Technol 51:1712–1738CrossRefGoogle Scholar
  12. 12.
    Hill J, Szewczyk R, Woo A, Hollar S, Culler D, Pister K (2000) System Architecture Directions for Networked Sensors. ASPLOS, November 2000Google Scholar
  13. 13.
    Hoglund G, McGraw G (2004) Exploiting Software: How to Break Code. Addison-WesleyGoogle Scholar
  14. 14.
    Hussain R, Heekuck O (2014) Cooperation-aware VANET clouds: providing secure cloud services to vehicular ad hoc networks. J Inform Process Sys 10(1):103–118. doi: 10.3745/JIPS.2014.10.1.103 CrossRefGoogle Scholar
  15. 15.
    ISO. ISO 7498-2:1989 (1989) Information processing systems- Open Systems Interconnection. ISO 7498–2Google Scholar
  16. 16.
    Kohno E, Okazaki T, Takeuchi M, Ohtaa T, Kakuda Y, Aida M (2012) Improvement of assurance including security for wireless sensor networks using dispersed data transmission. J Comput Syst Sci 78:1703–1715MathSciNetCrossRefzbMATHGoogle Scholar
  17. 17.
    Krishnamurthy L, Adler R, Buonadonna P, Chhabra J, Flanigan M, Kushalmager N, Nachman L, Yarvis M (2005) Design and deployment of industrial sensor networks: experiences from a semiconductor plant and the North Sea. in: Proceedings of the Third International Conference on Embedded Networked Sensor Systems (Sensys), SanDiego, CAGoogle Scholar
  18. 18.
    Lorincz K, Malan D, Fulford-Jones TRF, Nawoj A, Clavel A, Shnayder V, Mainland G, Welsh M, Moulton S (2004) Sensor networks for emergency response: challenges and opportunities, Pervasive Computing for First Response (Special Issue). IEEE Pervasive Computing, October–December 2004Google Scholar
  19. 19.
    McGraw G (2004) Software Security. IEEE SECURITY & PRIVACY, p 80–83Google Scholar
  20. 20.
    National Instruments (2012) What Is a Wireless Sensor Network?, Publish Date: May 2012
  21. 21.
  22. 22.
    Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE (2002) Spins: security protocols for sensor networks. Wirel Netw 8(5):521–534CrossRefzbMATHGoogle Scholar
  23. 23.
    Saaty TL (1980) The analytic hierarchy process. McGraw-Hill, New YorkzbMATHGoogle Scholar
  24. 24.
    Saaty TL (1996) Decision making with dependence and feedback: the analytic network process. RWS Publications, PittsburghGoogle Scholar
  25. 25.
    Saaty TL (2008) Decision making with the analytic hierarchy process. Intern J Serv Sci 1(1):83–98MathSciNetGoogle Scholar
  26. 26.
    Sharmaa G, Balaa S, Vermaa AK (2012) Security frameworks for wireless sensor networks-review. Procedia Technol 6:978–987CrossRefGoogle Scholar
  27. 27.
    Simon G, Maroti M, Ledeczi A, Balogh G, Kusy B, Nadas A, Pap G, Sallai J, Frampton K (2004) Sensor network-based counter sniper system. in: Proceedings of the Second International Conference on Embedded Networked Sensor Systems (Sensys), Baltimore, MDGoogle Scholar
  28. 28.
    Sinha A (2013) Daya Krishan Lobiyal, performance evaluation of data aggregation for cluster-based wireless sensor network. Human-Centric Comput Inform Sci 3:13. doi: 10.1186/2192-1962-3-13 CrossRefGoogle Scholar
  29. 29.
    Stankovic JA (2006) Wireless Sensor Networks,, 19 June 2006
  30. 30.
    W3C, Web Services (2004) Architecture.Google Scholar
  31. 31.
    Walters JP, Liang Z, Shi W, Chaudhary V (2006) Wireless Sensor Network Security: A Survey.
  32. 32.
    Wener-Allen G, Lorincz K, Ruiz M, Marcillo O, Johnson J, Lees J, Walsh M (2006) Deploying a wireless sensor network on an active volcano. Data-Driven Applications in Sensor Networks (Special Issue), IEEE Internet Computing, March/April 2006Google Scholar
  33. 33.
    Yick J, Mukherjee B, Ghosal D (2005) Analysis of a Prediction-based Mobility Adaptive Tracking Algorithm. In: Proceedings of the IEEE Second International Conference on Broadband Networks (BROADNETS), BostonGoogle Scholar
  34. 34.
    Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330CrossRefGoogle Scholar
  35. 35.
    Yoon M, Kim Y-K, Chang J-W (2013) An energy-efficient routing protocol using message success rate in wireless sensor networks. J Convergence 4(1):15–22CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Humanitas CollegeKyung Hee University, Kyung Hee University 1 Hoegi-dongSeoulSouth Korea

Personalised recommendations