Ensuring Security and Availability through Model-Based Cross-Layer Adaptation

  • Minyoung Kim
  • Mark-Oliver Stehr
  • Ashish Gehani
  • Carolyn Talcott
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6905)


Situation- and resource-aware security is essential for the process control systems, composed of networked entities with sensors and actuators, that monitor and control the national critical infrastructure. However, security cannot be addressed at a single layer because of the inherent dependencies and tradeoffs among crosscutting concerns. Techniques applied at one layer to improve security affect security, timing, and power consumption at other layers. This paper argues for an integrated treatment of security across multiple layers of abstraction (application, middleware, operating system including network stack, and hardware). An important step in realizing this integrated treatment of situation- and resource-aware security is first understanding the cross-layer interactions between security policies and then exploiting these interactions to design efficient adaptation strategies (i) to balance security, quality of service, and energy needs, and (ii) to maximize system availability. We propose a novel approach that employs a compositional method within an iterative tuning framework based on lightweight formal methods with dynamic adaptation.


Mobile Robot Mobile Node Security Policy Selective Encryption Secure Group Communication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Pister, K.: From smart dust to smart plants the evolution of wireless sensor networking. In: ISA EXPO 2008: Keynote Speech (2008),
  2. 2.
    Mohapatra, S., Dutt, N., Nicolau, A., Venkatasubramanian, N.: DYNAMO: A cross-layer framework for end-to-end QoS and energy optimization in mobile handheld devices. IEEE Journal on Selected Areas in Communications 25(4), 722–737 (2007)CrossRefGoogle Scholar
  3. 3.
    xTune Framework,
  4. 4.
    Kim, M., Stehr, M.-O., Kim, J., Ha, S.: An application framework for loosely coupled networked cyber-physical systems. In: 8th IEEE Intl. Conf. on Embedded and Ubiquitous Computing (EUC 2010), Hong Kong (December 2010),
  5. 5.
    Bhargava, B., Shi, C., Wang, S.-Y.: MPEG video encryption algorithms. Multimedia Tools Appl. 24, 57–79 (2004)CrossRefGoogle Scholar
  6. 6.
    Gutierrez-Nolasco, S., Venkatasubramanian, N., Stehr, M.-O., Talcott, C.: Exploring adaptability of secure group communication using formal prototyping techniques. In: ARM 2004: Workshop on Adaptive and Reflective Middleware, pp. 232–237 (2004)Google Scholar
  7. 7.
    SPADE Project,
  8. 8.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: SP 2007: Proceedings of the IEEE Symposium on Security and Privacy, pp. 321–334 (2007)Google Scholar
  9. 9.
    Kao, J.-C., Marculescu, R.: Minimizing eavesdropping risk by transmission power control in multihop wireless networks. IEEE Trans. Comput. 56(8), 1009–1023 (2007)MathSciNetCrossRefGoogle Scholar
  10. 10.
  11. 11.
    Kim, M., Stehr, M.-O., Talcott, C., Dutt, N., Venkatasubramanian, N.: Constraint refinement for online verifiable cross-layer system adaptation. In: DATE 2008: Proceedings of the Design, Automation and Test in Europe Conference and Exposition (2008)Google Scholar
  12. 12.
    Stehr, M.-O., Kim, M., Talcott, C.: Toward distributed declarative control of networked cyber-physical systems. In: Yu, Z., Liscano, R., Chen, G., Zhang, D., Zhou, X. (eds.) UIC 2010. LNCS, vol. 6406, pp. 397–413. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  13. 13.
    Rusu, R.B., Maldonado, A., Beetz, M., Gerkey, B.: Extending Player/Stage/Gazebo towards cognitive robots acting in ubiquitous sensor-equipped environments. In: IEEE Intl. Conf. on Robotics and Automation Workshop for Network Robot Systems (2007)Google Scholar
  14. 14.
    Kim, M., Oh, H., Dutt, N., Nicolau, A., Venkatasubramanian, N.: PBPAIR: An energy-efficient error-resilient encoding using probability based power aware intra refresh. ACM SIGMOBILE Mob. Comput. Commun. Rev. 10(3), 58–69 (2006)CrossRefGoogle Scholar
  15. 15.
    Schaar, M.V.D., Shankar, S.: Cross-layer wireless multimedia transmission: challenges, principles, and new paradigms. IEEE Wireless Communications 12, 50–58 (2005)CrossRefGoogle Scholar
  16. 16.
    Chiang, M., Low, S.H., Calderbank, A.R., Doyle, J.C.: Layering as optimization decomposition:a mathematical theory of network architectures. Proceedings of the IEEE 95(1), 255–312 (2007)CrossRefGoogle Scholar
  17. 17.
    Wang, W.: Quality-driven cross layer design for multimedia security over resource constrained wireless sensor networks. University of Nebraska, Lincoln, Dept. of Computer and Electronics Engineering, Ph.D. Dissertation (2009)Google Scholar
  18. 18.
    Kim, M., Massaguer, D., Dutt, N., Mehrotra, S., Ren, S., Stehr, M.-O., Talcott, C., Venkatasubramanian, N.: A semantic framework for reconfiguration of instrumented cyber physical spaces. In: Workshop on Event-based Semantics, CPS Week (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Minyoung Kim
    • 1
  • Mark-Oliver Stehr
    • 1
  • Ashish Gehani
    • 1
  • Carolyn Talcott
    • 1
  1. 1.SRI InternationalUSA

Personalised recommendations