Abstract
The event-condition-action (ECA) paradigm holds enormous potential in pervasive computing environments. However, the problem of reliable delivery of event data, generated by low capability sensor devices, to more capable processing points and vice versa, needs to be addressed for the success of the ECA paradigm in this environment. The problem becomes interesting because strong cryptographic techniques for achieving integrity impose unacceptable overhead in many pervasive computing environments. We address this problem by sending the data over the path from the sensor node to the processing point that provides the best opportunity of reliable delivery among competing paths. This allows using much weaker cryptographic techniques for achieving security. The problem is modeled as a problem of determining the most reliable path – similar to routing problems in networks. We propose a trust-based metric for measuring reliability of paths. The higher the trust value of a path the more reliable it is considered. We propose techniques for estimating the trust levels of paths and propose a new algorithm for identifying the desired path.
Keywords
- Average Cost
- Receive Signal Strength Indicator
- Malicious Node
- Route Discovery
- Trust Relationship
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This work was partially supported by the U.S. Air Force Research Laboratory (AFRL) and the Federal Aviation Administration (FAA) under contract F30602-03-1-0101 and by the U.S. Air Force Office of Scientific Research under contract FA9550-07-1-0042. Any opinions, findings, and conclusions expressed in this publication are solely those of authors and do not necessarily represent those of the AFRL, the FAA, or the AFOSR.
Chapter PDF
References
Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to Strangers: Authentication in Adhoc Wireless Networks. In: Symposium on Network and Distributed Systems Security (NDSS 2002), San Diego, California, USA (February 2002)
Chiang, C.C., Wu, H.K., Liu, W., Gerla, M.: Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel. In: 5th IEEE Singapore International Conference on Networks (SICON 1997), Kent Ridge, Singapore, pp. 197–211 (April 1997)
Corson, M.S., Ephremides, A.: A Distributed Routing Algorithm for Mobile Wireless Networks. Wireless Networks 1(1), 61–82 (1995)
Gafni, E., Bertsekas, D.: Distributed Algorithms for Geneerating Loop-free Routes in Network with Frequently Changing Topology. IEEE Transaction and Communication 29(1), 11–15 (1981)
Gerla, M., Tsai, J.T.: Multicluster, Mobile, Multimedia Radio Network. Wireless Networks 1(3), 255–265 (1995)
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom 2002), Atlanta, Georgia, USA (September 2002)
Papadimitratos, P., Haas, Z.: Secure Data Transmission in Mobile Ad Hoc Networks. In: ACM Workshop on Wireless Security (WiSe 2003), San Diego, California, USA (September 2003)
Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance Vector (DSDV) for Mobile Computers. In: Conference on Communication Architectures, Protocols and Applications (SIGCOMM 1994), London, UK, pp. 234–244 (August 1994)
Toh, C.K.: A Novel Distributed Routing Protocol To Support Ad hoc Mobile Computing. In: IEEE 15th Annual International Phoenix Conference on Computers and Communication (IPCCC 1996), Phoenix, AZ, USA, pp. 480–486 (1996)
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network 13(6), 24–30 (1999)
Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Alexandria, VA, USA, pp. 1–10. ACM Press, NewYork (2005)
Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe 2002), Atlanta, GA, USA, pp. 21–30 (September 2002)
Dube, R., Rais, C.D., Wang, K.Y., Tripathi, S.K.: Signal Stability-Based Adaptive Routing (SSA) for Ad Hoc Mobile Networks. IEEE Personal Communications Magazine 4(1), 36–45 (1997)
Yi, S., Naldurg, P., Kravets, R.: Security-Aware Ad Hoc Routing for Wireless Networks. In: Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001), Long Beach, CA, October 2001, pp. 299–302. ACM Press, New York (2001)
Ray, I., Chakraborty, S.: A Vector Model of Trust for Developing Trustworthy Systems. In: Samarati, P., Ryan, P.Y A, Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 260–275. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 IFIP International Federation for Information Processing
About this paper
Cite this paper
Chakraborty, S., Poolsappasit, N., Ray, I. (2007). Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. In: Barker, S., Ahn, GJ. (eds) Data and Applications Security XXI. DBSec 2007. Lecture Notes in Computer Science, vol 4602. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73538-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-73538-0_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73533-5
Online ISBN: 978-3-540-73538-0
eBook Packages: Computer ScienceComputer Science (R0)
