Advertisement

Intrusion-Tolerant Jini Service Architecture for Ensuring Survivability of U-Services Based on WSN

  • Sung-Ki KimEmail author
  • Jae-Yeong Choi
  • Byung-Gyu Kim
  • Byoung-Joon Min
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 274)

Abstract

U-Service environment based on WSN(Wireless Sensor Network) is poor in reliability of connection and has a high probability that the intrusion and the system failure may occur. Therefore, it is very important to ensure that the legitimate users make use of trustable services without discontinuance or obstacle of the services they are enjoying despite the presence of failures and intrusions. In this paper, we propose an intrusion-tolerant Jini service architecture integrating security and survivability mechanisms in order to provide end users with Jini services having a persistent state in wireless sensor networks. The proposed architecture is able to protect a Jini system not only from faults such as network partitioning or server crash, but also from attacks exploiting flaws. It is designed to provide performance enough to show a low response latency so as to support seamless service usage. Through the experiment on a test-bed, we have confirmed that the architecture is able to provide high security and availability at the level that the degradation of services quality is ignorable.

Keywords

Intrusion-tolerance Jini Apache River Jgroup/ARM Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Apache Software Foundation, Apache Jini Specifications v2.1.2, Published Specification, http://river.apache.org/doc/spec-index.html
  2. 2.
    Apache Software Foundation, Apache River User Guide, http://river.apache.org/user-guide-basic-river-services.html
  3. 3.
    Meling, H., et al.: Jgroup/ARM: a distributed object group platform with autonomous replication managements. Software Practice and Experience (2007)Google Scholar
  4. 4.
    Kolltveit, H., Hvasshovd, S.-O.: Preventing Orphan Requests by Integrating Replication and Transactions. In: Ioannidis, Y., Novikov, B., Rachev, B. (eds.) ADBIS 2007. LNCS, vol. 4690, pp. 41–54. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Pease, M., Shostak, R., Lamport, L.: Reaching Agreement in the Presence of Faults. Journal of the ACM 27(2), 228–234 (1980)MathSciNetzbMATHCrossRefGoogle Scholar
  6. 6.
    Min, B.J., Kim, S.K., Im, C.: Committing Secure Results with Replicated Servers. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 246–253. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Sung-Ki Kim
    • 1
    Email author
  • Jae-Yeong Choi
    • 3
  • Byung-Gyu Kim
    • 2
  • Byoung-Joon Min
    • 3
  1. 1.Division of IT EducationSun Moon UniversityAsan-siRepublic of Korea
  2. 2.Dep. of Computer Science and EngineeringSun Moon UniversityAsan-siRepublic of Korea
  3. 3.Dep. of Computer Science and EngineeringIncheon National UniversityIncheonRepublic of Korea

Personalised recommendations