Abstract
This study aims to reduce security vulnerabilities of sensor networks which transmit data in an open environment by developing a forecasting service system. The system is to remove or monitor causes of breach incidents in advance. To that end, this research first examines general security vulnerabilities of sensor networks and analyzes characteristics of existing forecasting systems. Then, 5 steps of a forecasting service system are proposed in order to improve security responses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Traynor, P., McDaniel, P., La Porta, T.: On attack causality in internet-connected cellular networks. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, Boston (2007)
Information Security.: Serious and Widespread weaknesses Persist at Federal Agencies. GAO/AMID-00-295 (2000)
AhnLab Security Emergency response Center, http://download.ahnlab.com/asecReport/ASEC_Report_200902.pdf
Yun, J., Paek, S.-H., Lee, D., Yoon, H.: Traffic Volume Forecasting Model for Cyber Weather Forecasting. In: Szczuka, M.S., Howard, D., Ślęzak, D., Kim, H.-k., Kim, T.-h., Ko, I.-s., Lee, G., Sloot, P.M.A. (eds.) ICHIT 2006. LNCS (LNAI), vol. 4413, pp. 274–276. Springer, Heidelberg (2006)
Yurcik, W., Korzyk, A., Loomis, D.: Predicting Internet Attacks: On Developing An Effective Measurement Methodology. In: 18th Annual International Communications Forecasting Conference, ICFC 2002 (2000)
Zhang, W., Cao, G.: Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach. In: Proc. INFOCOM, pp. 503–514 (2005)
Scarfone, K., Grance, T., Masone, K.: Computer Security Incident Handling Guide, Special Publication 800-61, National Institute of Standards and Technology, U.S. Department of Commerce (2006)
Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS), Special Publication 800-94, National Institute of Standards and Technology, U.S. Department of Commerce (2006)
Forecast process, http://www.nhc.noaa.gov/HAW2/english/forecast_process.shtml
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proc. S&P, pp. 259–271 (2004)
Borman, S.: An The Expectation Maximization Algorithm A short tutorial (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Song, Jg., Kim, J.h., Seo, D.i., Kim, S. (2010). Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks. In: Kim, Th., Stoica, A., Chang, RS. (eds) Security-Enriched Urban Computing and Smart Grid. SUComS 2010. Communications in Computer and Information Science, vol 78. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16444-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-16444-6_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16443-9
Online ISBN: 978-3-642-16444-6
eBook Packages: Computer ScienceComputer Science (R0)