Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks

  • Jae-gu Song
  • Jong hyun Kim
  • Dong il Seo
  • Seoksoo Kim
Part of the Communications in Computer and Information Science book series (CCIS, volume 78)

Abstract

This study aims to reduce security vulnerabilities of sensor networks which transmit data in an open environment by developing a forecasting service system. The system is to remove or monitor causes of breach incidents in advance. To that end, this research first examines general security vulnerabilities of sensor networks and analyzes characteristics of existing forecasting systems. Then, 5 steps of a forecasting service system are proposed in order to improve security responses.

Keywords

Monitors Vulnerabilities Sensor Network Forecasting System Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Traynor, P., McDaniel, P., La Porta, T.: On attack causality in internet-connected cellular networks. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, Boston (2007)Google Scholar
  2. 2.
    Information Security.: Serious and Widespread weaknesses Persist at Federal Agencies. GAO/AMID-00-295 (2000)Google Scholar
  3. 3.
    AhnLab Security Emergency response Center, http://download.ahnlab.com/asecReport/ASEC_Report_200902.pdf
  4. 4.
    Yun, J., Paek, S.-H., Lee, D., Yoon, H.: Traffic Volume Forecasting Model for Cyber Weather Forecasting. In: Szczuka, M.S., Howard, D., Ślęzak, D., Kim, H.-k., Kim, T.-h., Ko, I.-s., Lee, G., Sloot, P.M.A. (eds.) ICHIT 2006. LNCS (LNAI), vol. 4413, pp. 274–276. Springer, Heidelberg (2006)Google Scholar
  5. 5.
    Yurcik, W., Korzyk, A., Loomis, D.: Predicting Internet Attacks: On Developing An Effective Measurement Methodology. In: 18th Annual International Communications Forecasting Conference, ICFC 2002 (2000)Google Scholar
  6. 6.
    Zhang, W., Cao, G.: Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach. In: Proc. INFOCOM, pp. 503–514 (2005)Google Scholar
  7. 7.
    Scarfone, K., Grance, T., Masone, K.: Computer Security Incident Handling Guide, Special Publication 800-61, National Institute of Standards and Technology, U.S. Department of Commerce (2006)Google Scholar
  8. 8.
    Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS), Special Publication 800-94, National Institute of Standards and Technology, U.S. Department of Commerce (2006)Google Scholar
  9. 9.
  10. 10.
    Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proc. S&P, pp. 259–271 (2004)Google Scholar
  11. 11.
    Borman, S.: An The Expectation Maximization Algorithm A short tutorial (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Jae-gu Song
    • 1
  • Jong hyun Kim
    • 2
  • Dong il Seo
    • 2
  • Seoksoo Kim
    • 2
  1. 1.Dept. of MultimediaHannam Univ.DaejeonKorea
  2. 2.Electronics and Telecommunications Research InstituteDaejeonKorea

Personalised recommendations