Abstract
The security concern in wireless sensor networks is driven by the need for increased assurance regarding the system. In this light, research on protecting the network from threats originating from the hostile outside has been ongoing. Additionally, many real world applications of sensor networks move away from the monolithic application model – node capabilities need to be shared among different applications of different actors. This view introduces additional security requirements. This paper addresses controlled usage of resources, a primary security requirement in case of sensor sharing. A distributed reference monitor is proposed as the enforcement mechanism. The monitor is policy-driven which enables lightweight run-time control of the resource accesses. Resource constraints as well as current programming and operational models are respected through use of a selective injection strategy based on code rewriting during pre-deployment. Code rewriting is controlled by aspect-oriented constructs. The approach is validated by a research prototype.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Mainwaring, A., Culler, D., Polastre, J., Szewczyk, R., Anderson, J.: Wireless sensor networks for habitat monitoring. In: 1st ACM International Workshop on Wireless Sensor Networks and Applications, pp. 88–97. ACM, Atlanta (2002)
Heinzelman, W.B., Murphy, A.L., Carvalho, H.S., Perillo, M.A.: Middleware to support sensor network applications. IEEE Network 18, 6–14 (2004)
Huygens, C., Joosen, W.: Federated and Shared Use of Sensor Networks through Security Middleware. In: Sixth International Conference on Information Technology: New Generations, Las Vegas, NV, USA, pp. 1005–1011 (2009)
Anderson, J.P.: Computer Security Technology Planning Study. Hanscom AFB (1972)
Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. International Journal of Information Security 4, 2–16 (2005)
Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Security in Distributed, Grid, and Pervasive Computing, ch. 17. CRC Press, Boca Raton (2006)
Wang, M.M., Cao, J.N., Li, J., Dasi, S.K.: Middleware for wireless sensor networks: A survey. Journal of Computer Science and Technology 23, 305–326 (2008)
Newton, R., Morrisett, G., Welsh, M.: The regiment macroprogramming system. In: 6th International Conference on Information Processing in Sensor Networks, pp. 489–498. ACM, Cambridge (2007)
Westhoff, D., Girao, J., Sarma, A.: Security Solutions for Wireless Sensor Networks. NEC Tech. J. 1, 106–111 (2006)
Deng, J., Han, R., Mishra, S.: Secure code distribution in dynamically programmable wireless sensor networks. In: 5th International Conference on Information Processing in Sensor Networks, pp. 292–300. ACM, Nashville (2006)
The AspectJ Project, http://www.eclipse.org/aspectj
SunSPOTWorld – Home, http://www.sunspotworld.org
Gu, L., Stankovic, J.A.: t-kernel: providing reliable OS support to wireless sensor networks. In: 4th International Conference on Embedded Networked Sensor Systems, pp. 1–14. ACM, Boulder (2006)
Lobo, J., Bhatia, R., Naqvi, S.: A policy description language. In: Sixteenth National Conference on Artificial Intelligence and the Eleventh Innovative Applications of Artificial Intelligence Conference Innovative Applications of Artificial Intelligence, pp. 291–298. American Association for Artificial Intelligence, Orlando (1999)
Matthys, N., Hughes, D., Michiels, S., Huygens, C., Joosen, W.: Fine-Grained Tailoring of Component Behaviour for Embedded Systems. In: Lee, S., Narasimhan, P. (eds.) SEUS 2009. LNCS, vol. 5860, pp. 156–167. Springer, Heidelberg (2009)
Van Stijn, E., Bjorn-Andersen, N., Razmerita, L., Henriksen, H.: Improving International e-Customs–The European ITAIDE Initiative. In: First International Conference on the Digital Society (ICDS 2007), p. 21. Guadeloupe, French Caribbean (2007)
Integrity, http://www.integrity-supplychain.eu
Sabbah, E., Majeed, A., Kang, K., Liu, K., Abu-Ghazaleh, N.: An application-driven perspective on wireless sensor network security. In: 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks, pp. 1–8. ACM, Terromolinos (2006)
Platon, E., Sei, Y.: Security software engineering in wireless sensor networks. Progress in Informatics 5, 49–64 (2008)
Han, Q., Venkatasubramanian, N.: Information Collection Services for QoS-Aware Mobile Applications. IEEE Transactions on Mobile Computing 5, 518–535 (2006)
Bischoff, U., Kortuem, G.: Life cycle support for sensor network applications. In: 2nd International Workshop on Middleware for Sensor Networks, pp. 1–6. ACM, Newport Beach (2007)
Sadilek, D.A.: Energy-aware compilation for wireless sensor networks. In: 2nd International Workshop on Middleware for Sensor Networks, pp. 25–30. ACM, Newport Beach (2007)
Tuohimaa, S., Leppänen, V.: A compact aspect-based security monitor for J2ME applications. In: 2007 International Conference on Computer Systems and Technologies, pp. 1–6. ACM, Bulgaria (2007)
Walton, S., Eide, E.: Resource management aspects for sensor network software. In: 4th Workshop on Programming Languages and Operating Systems, pp. 1–5. ACM, Stevenson (2007)
Keoh, S., Twidle, K., Pryce, N., Lupu, E., Schaeffer Filho, A., Dulay, N., Sloman, M., Heeps, S., Strowes, S., Sventek, J.: Policy-based Management for Body-Sensor Networks. In: 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007), IFMBE Proceedings, vol. 13, pp. 92–98 (2007)
Russello, G., Mostarda, L., Dulay, N.: ESCAPE: A Component-Based Policy Framework for Sense and React Applications. In: Chaudron, M.R.V., Szyperski, C., Reussner, R. (eds.) CBSE 2008. LNCS, vol. 5282, pp. 212–229. Springer, Heidelberg (2008)
Marsh, D.W., Baldwin, R.O., Mullins, B.E., Mills, R.F., Grimaila, M.R.: A security policy language for wireless sensor networks. J. Syst. Softw. 82, 101–111 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Huygens, C., Matthys, N., Joosen, W. (2010). Optimized Resource Access Control in Shared Sensor Networks. In: Schmidt, A.U., Russello, G., Lioy, A., Prasad, N.R., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 47. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17502-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-17502-2_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17501-5
Online ISBN: 978-3-642-17502-2
eBook Packages: Computer ScienceComputer Science (R0)