Abstract

The security concern in wireless sensor networks is driven by the need for increased assurance regarding the system. In this light, research on protecting the network from threats originating from the hostile outside has been ongoing. Additionally, many real world applications of sensor networks move away from the monolithic application model – node capabilities need to be shared among different applications of different actors. This view introduces additional security requirements. This paper addresses controlled usage of resources, a primary security requirement in case of sensor sharing. A distributed reference monitor is proposed as the enforcement mechanism. The monitor is policy-driven which enables lightweight run-time control of the resource accesses. Resource constraints as well as current programming and operational models are respected through use of a selective injection strategy based on code rewriting during pre-deployment. Code rewriting is controlled by aspect-oriented constructs. The approach is validated by a research prototype.

Keywords

Sensor Network security monitor policy aspect-oriented 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mainwaring, A., Culler, D., Polastre, J., Szewczyk, R., Anderson, J.: Wireless sensor networks for habitat monitoring. In: 1st ACM International Workshop on Wireless Sensor Networks and Applications, pp. 88–97. ACM, Atlanta (2002)Google Scholar
  2. 2.
    Heinzelman, W.B., Murphy, A.L., Carvalho, H.S., Perillo, M.A.: Middleware to support sensor network applications. IEEE Network 18, 6–14 (2004)CrossRefGoogle Scholar
  3. 3.
    Huygens, C., Joosen, W.: Federated and Shared Use of Sensor Networks through Security Middleware. In: Sixth International Conference on Information Technology: New Generations, Las Vegas, NV, USA, pp. 1005–1011 (2009)Google Scholar
  4. 4.
    Anderson, J.P.: Computer Security Technology Planning Study. Hanscom AFB (1972)Google Scholar
  5. 5.
    Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. International Journal of Information Security 4, 2–16 (2005)CrossRefGoogle Scholar
  6. 6.
    Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Security in Distributed, Grid, and Pervasive Computing, ch. 17. CRC Press, Boca Raton (2006)Google Scholar
  7. 7.
    Wang, M.M., Cao, J.N., Li, J., Dasi, S.K.: Middleware for wireless sensor networks: A survey. Journal of Computer Science and Technology 23, 305–326 (2008)CrossRefGoogle Scholar
  8. 8.
    Newton, R., Morrisett, G., Welsh, M.: The regiment macroprogramming system. In: 6th International Conference on Information Processing in Sensor Networks, pp. 489–498. ACM, Cambridge (2007)Google Scholar
  9. 9.
    Westhoff, D., Girao, J., Sarma, A.: Security Solutions for Wireless Sensor Networks. NEC Tech. J. 1, 106–111 (2006)Google Scholar
  10. 10.
    Deng, J., Han, R., Mishra, S.: Secure code distribution in dynamically programmable wireless sensor networks. In: 5th International Conference on Information Processing in Sensor Networks, pp. 292–300. ACM, Nashville (2006)Google Scholar
  11. 11.
    The AspectJ Project, http://www.eclipse.org/aspectj
  12. 12.
    SunSPOTWorld – Home, http://www.sunspotworld.org
  13. 13.
    Gu, L., Stankovic, J.A.: t-kernel: providing reliable OS support to wireless sensor networks. In: 4th International Conference on Embedded Networked Sensor Systems, pp. 1–14. ACM, Boulder (2006)Google Scholar
  14. 14.
    Lobo, J., Bhatia, R., Naqvi, S.: A policy description language. In: Sixteenth National Conference on Artificial Intelligence and the Eleventh Innovative Applications of Artificial Intelligence Conference Innovative Applications of Artificial Intelligence, pp. 291–298. American Association for Artificial Intelligence, Orlando (1999)Google Scholar
  15. 15.
    Matthys, N., Hughes, D., Michiels, S., Huygens, C., Joosen, W.: Fine-Grained Tailoring of Component Behaviour for Embedded Systems. In: Lee, S., Narasimhan, P. (eds.) SEUS 2009. LNCS, vol. 5860, pp. 156–167. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  16. 16.
    Van Stijn, E., Bjorn-Andersen, N., Razmerita, L., Henriksen, H.: Improving International e-Customs–The European ITAIDE Initiative. In: First International Conference on the Digital Society (ICDS 2007), p. 21. Guadeloupe, French Caribbean (2007)CrossRefGoogle Scholar
  17. 17.
  18. 18.
    Sabbah, E., Majeed, A., Kang, K., Liu, K., Abu-Ghazaleh, N.: An application-driven perspective on wireless sensor network security. In: 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks, pp. 1–8. ACM, Terromolinos (2006)Google Scholar
  19. 19.
    Platon, E., Sei, Y.: Security software engineering in wireless sensor networks. Progress in Informatics 5, 49–64 (2008)CrossRefGoogle Scholar
  20. 20.
    Han, Q., Venkatasubramanian, N.: Information Collection Services for QoS-Aware Mobile Applications. IEEE Transactions on Mobile Computing 5, 518–535 (2006)CrossRefGoogle Scholar
  21. 21.
    Bischoff, U., Kortuem, G.: Life cycle support for sensor network applications. In: 2nd International Workshop on Middleware for Sensor Networks, pp. 1–6. ACM, Newport Beach (2007)CrossRefGoogle Scholar
  22. 22.
    Sadilek, D.A.: Energy-aware compilation for wireless sensor networks. In: 2nd International Workshop on Middleware for Sensor Networks, pp. 25–30. ACM, Newport Beach (2007)CrossRefGoogle Scholar
  23. 23.
    Tuohimaa, S., Leppänen, V.: A compact aspect-based security monitor for J2ME applications. In: 2007 International Conference on Computer Systems and Technologies, pp. 1–6. ACM, Bulgaria (2007)CrossRefGoogle Scholar
  24. 24.
    Walton, S., Eide, E.: Resource management aspects for sensor network software. In: 4th Workshop on Programming Languages and Operating Systems, pp. 1–5. ACM, Stevenson (2007)Google Scholar
  25. 25.
    Keoh, S., Twidle, K., Pryce, N., Lupu, E., Schaeffer Filho, A., Dulay, N., Sloman, M., Heeps, S., Strowes, S., Sventek, J.: Policy-based Management for Body-Sensor Networks. In: 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007), IFMBE Proceedings, vol. 13, pp. 92–98 (2007)Google Scholar
  26. 26.
    Russello, G., Mostarda, L., Dulay, N.: ESCAPE: A Component-Based Policy Framework for Sense and React Applications. In: Chaudron, M.R.V., Szyperski, C., Reussner, R. (eds.) CBSE 2008. LNCS, vol. 5282, pp. 212–229. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  27. 27.
    Marsh, D.W., Baldwin, R.O., Mullins, B.E., Mills, R.F., Grimaila, M.R.: A security policy language for wireless sensor networks. J. Syst. Softw. 82, 101–111 (2009)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2010

Authors and Affiliations

  • Christophe Huygens
    • 1
  • Nelson Matthys
    • 1
  • Wouter Joosen
    • 1
  1. 1.IBBT-DistriNet, Department of Computer ScienceK.U. LeuvenHeverleeBelgium

Personalised recommendations