Skip to main content

MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 329))

Abstract

Nowadays chipped based sensors and RFID tags are widely employed in Internet of Things; however, for those devices, effective and flexible security mechanisms lack. In this paper we study the security requirement and propose an adaptive security framework for sensors in Internet of things, which provides dynamic confidentiality, authenticity and integrity in the networks with relative suitable overhead by context aware computing, decision making and dynamic enforcement of policies. We employ Markov Decision Process to make the decisions of security actions and adopt aspect-oriented programming technique to enforce the security policies dynamically in the working networks. We made simulations of our framework, and the performance is encouraging.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baldauf, M., Dustdar, S., Rosenberg, F.: A survey on context-aware systems. International Journal of Ad Hoc and Ubiquitous Computing 2(4), 263–277 (2007)

    Article  Google Scholar 

  2. Santos, A.C., et al.: Challenges in the Development of Context-Inference Systems for Mobile Applications. International Workshop on Programming Methods for Mobile and Pervasive Systems (PMMPS), colocated with Pervasive (2010)

    Google Scholar 

  3. Min, J.-K., Cho, S.-B.: A hybrid context-aware wearable system with evolutionary optimization and selective inference of dynamic bayesian networks. In: Corchado, E., Kurzyński, M., Woźniak, M. (eds.) HAIS 2011, Part I. LNCS (LNAI), vol. 6678, pp. 444–451. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  4. Mehra, P.: Context-aware computing: beyond search and location-based services. IEEE Internet Computing 16(2), 12–16 (2012)

    Article  Google Scholar 

  5. Perera, C., Zaslavsky, A., Christen, P., et al.: Context aware computing for the internet of things: A survey (2013)

    Google Scholar 

  6. Stere, P., Cuppens, F., Cuppens-Boulahia, N., Garcia-Alfaro, J., Toutain, L.: Dynamic deployment of context-aware access control policies for constrained security devices. Journal of Systems and Software 84(7), 1144–1159 (2011)

    Article  Google Scholar 

  7. Piotr, M., Magill, S., Hicks, M., Srivatsa, M.: Dynamic enforcement of knowledge-based security policies. In: 2011 IEEE 24th Computer Security Foundations Symposium (CSF), pp. 114–128. IEEE (2011)

    Google Scholar 

  8. Aloulou, H., Loulou, M., Kallel, S., Hadj Kacem, A.: RDyMASS: Reliable and dynamic enforcement of security policies for mobile agent systems. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., Roudier, Y. (eds.) DPM 2009 and SETOP 2009. LNCS, vol. 5939, pp. 237–252. Springer, Heidelberg (2010)

    Google Scholar 

  9. Rafailidis, F., Panagos, I., Katsaros, P., et al.: Inlined monitors for security policy enforcement in web applications. In: Proceedings of the 17th Panhellenic Conference on Informatics, pp. 75–82. ACM (2013)

    Google Scholar 

  10. Singh, S.N., Singh, M.P.: Aspect Oriented And Object Oriented Software Using Java Programming Tools. Golden Research Thoughts 2(2) (2012)

    Google Scholar 

  11. Siegmund, N., Rosenmuller, M., Moritz, G., et al.: Towards robust data storage in wireless sensor networks. IETE Technical Review 26(5), 335 (2009)

    Article  Google Scholar 

  12. Kumar, R.N., Bapuji, V., Govardhan, A., et al.: An Improvement to Trust Based Cross-Layer Security Protocol against Sybil Attacks (DAS). Computer Engineering and Intelligent Systems 3(7), 62–70 (2012)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eric Ke Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wang, E.K., Wu, TY., Chen, CM., Ye, Y., Zhang, Z., Zou, F. (2015). MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things. In: Sun, H., Yang, CY., Lin, CW., Pan, JS., Snasel, V., Abraham, A. (eds) Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, vol 329. Springer, Cham. https://doi.org/10.1007/978-3-319-12286-1_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12286-1_40

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12285-4

  • Online ISBN: 978-3-319-12286-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics