Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2007: Data and Applications Security XXI pp 77–92Cite as

  1. Home
  2. Data and Applications Security XXI
  3. Conference paper
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments

Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments

  • Sudip Chakraborty1,
  • Nayot Poolsappasit1 &
  • Indrajit Ray1 
  • Conference paper
  • 1070 Accesses

  • 6 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4602)

Abstract

The event-condition-action (ECA) paradigm holds enormous potential in pervasive computing environments. However, the problem of reliable delivery of event data, generated by low capability sensor devices, to more capable processing points and vice versa, needs to be addressed for the success of the ECA paradigm in this environment. The problem becomes interesting because strong cryptographic techniques for achieving integrity impose unacceptable overhead in many pervasive computing environments. We address this problem by sending the data over the path from the sensor node to the processing point that provides the best opportunity of reliable delivery among competing paths. This allows using much weaker cryptographic techniques for achieving security. The problem is modeled as a problem of determining the most reliable path – similar to routing problems in networks. We propose a trust-based metric for measuring reliability of paths. The higher the trust value of a path the more reliable it is considered. We propose techniques for estimating the trust levels of paths and propose a new algorithm for identifying the desired path.

Keywords

  • Average Cost
  • Receive Signal Strength Indicator
  • Malicious Node
  • Route Discovery
  • Trust Relationship

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This work was partially supported by the U.S. Air Force Research Laboratory (AFRL) and the Federal Aviation Administration (FAA) under contract F30602-03-1-0101 and by the U.S. Air Force Office of Scientific Research under contract FA9550-07-1-0042. Any opinions, findings, and conclusions expressed in this publication are solely those of authors and do not necessarily represent those of the AFRL, the FAA, or the AFOSR.

Chapter PDF

Download to read the full chapter text

References

  1. Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to Strangers: Authentication in Adhoc Wireless Networks. In: Symposium on Network and Distributed Systems Security (NDSS 2002), San Diego, California, USA (February 2002)

    Google Scholar 

  2. Chiang, C.C., Wu, H.K., Liu, W., Gerla, M.: Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel. In: 5th IEEE Singapore International Conference on Networks (SICON 1997), Kent Ridge, Singapore, pp. 197–211 (April 1997)

    Google Scholar 

  3. Corson, M.S., Ephremides, A.: A Distributed Routing Algorithm for Mobile Wireless Networks. Wireless Networks 1(1), 61–82 (1995)

    CrossRef  Google Scholar 

  4. Gafni, E., Bertsekas, D.: Distributed Algorithms for Geneerating Loop-free Routes in Network with Frequently Changing Topology. IEEE Transaction and Communication 29(1), 11–15 (1981)

    CrossRef  MathSciNet  Google Scholar 

  5. Gerla, M., Tsai, J.T.: Multicluster, Mobile, Multimedia Radio Network. Wireless Networks 1(3), 255–265 (1995)

    CrossRef  Google Scholar 

  6. Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom 2002), Atlanta, Georgia, USA (September 2002)

    Google Scholar 

  7. Papadimitratos, P., Haas, Z.: Secure Data Transmission in Mobile Ad Hoc Networks. In: ACM Workshop on Wireless Security (WiSe 2003), San Diego, California, USA (September 2003)

    Google Scholar 

  8. Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance Vector (DSDV) for Mobile Computers. In: Conference on Communication Architectures, Protocols and Applications (SIGCOMM 1994), London, UK, pp. 234–244 (August 1994)

    Google Scholar 

  9. Toh, C.K.: A Novel Distributed Routing Protocol To Support Ad hoc Mobile Computing. In: IEEE 15th Annual International Phoenix Conference on Computers and Communication (IPCCC 1996), Phoenix, AZ, USA, pp. 480–486 (1996)

    Google Scholar 

  10. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network 13(6), 24–30 (1999)

    CrossRef  Google Scholar 

  11. Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Alexandria, VA, USA, pp. 1–10. ACM Press, NewYork (2005)

    CrossRef  Google Scholar 

  12. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe 2002), Atlanta, GA, USA, pp. 21–30 (September 2002)

    Google Scholar 

  13. Dube, R., Rais, C.D., Wang, K.Y., Tripathi, S.K.: Signal Stability-Based Adaptive Routing (SSA) for Ad Hoc Mobile Networks. IEEE Personal Communications Magazine 4(1), 36–45 (1997)

    CrossRef  Google Scholar 

  14. Yi, S., Naldurg, P., Kravets, R.: Security-Aware Ad Hoc Routing for Wireless Networks. In: Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001), Long Beach, CA, October 2001, pp. 299–302. ACM Press, New York (2001)

    CrossRef  Google Scholar 

  15. Ray, I., Chakraborty, S.: A Vector Model of Trust for Developing Trustworthy Systems. In: Samarati, P., Ryan, P.Y A, Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 260–275. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Computer Science Department, Colorado State University, Fort Collins, CO 80523, USA

    Sudip Chakraborty, Nayot Poolsappasit & Indrajit Ray

Authors
  1. Sudip Chakraborty
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Nayot Poolsappasit
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Indrajit Ray
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Steve Barker Gail-Joon Ahn

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 IFIP International Federation for Information Processing

About this paper

Cite this paper

Chakraborty, S., Poolsappasit, N., Ray, I. (2007). Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. In: Barker, S., Ahn, GJ. (eds) Data and Applications Security XXI. DBSec 2007. Lecture Notes in Computer Science, vol 4602. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73538-0_6

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-73538-0_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73533-5

  • Online ISBN: 978-3-540-73538-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature