Skip to main content

Optimized Resource Access Control in Shared Sensor Networks

  • Conference paper

Abstract

The security concern in wireless sensor networks is driven by the need for increased assurance regarding the system. In this light, research on protecting the network from threats originating from the hostile outside has been ongoing. Additionally, many real world applications of sensor networks move away from the monolithic application model – node capabilities need to be shared among different applications of different actors. This view introduces additional security requirements. This paper addresses controlled usage of resources, a primary security requirement in case of sensor sharing. A distributed reference monitor is proposed as the enforcement mechanism. The monitor is policy-driven which enables lightweight run-time control of the resource accesses. Resource constraints as well as current programming and operational models are respected through use of a selective injection strategy based on code rewriting during pre-deployment. Code rewriting is controlled by aspect-oriented constructs. The approach is validated by a research prototype.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mainwaring, A., Culler, D., Polastre, J., Szewczyk, R., Anderson, J.: Wireless sensor networks for habitat monitoring. In: 1st ACM International Workshop on Wireless Sensor Networks and Applications, pp. 88–97. ACM, Atlanta (2002)

    Google Scholar 

  2. Heinzelman, W.B., Murphy, A.L., Carvalho, H.S., Perillo, M.A.: Middleware to support sensor network applications. IEEE Network 18, 6–14 (2004)

    Article  Google Scholar 

  3. Huygens, C., Joosen, W.: Federated and Shared Use of Sensor Networks through Security Middleware. In: Sixth International Conference on Information Technology: New Generations, Las Vegas, NV, USA, pp. 1005–1011 (2009)

    Google Scholar 

  4. Anderson, J.P.: Computer Security Technology Planning Study. Hanscom AFB (1972)

    Google Scholar 

  5. Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. International Journal of Information Security 4, 2–16 (2005)

    Article  Google Scholar 

  6. Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Security in Distributed, Grid, and Pervasive Computing, ch. 17. CRC Press, Boca Raton (2006)

    Google Scholar 

  7. Wang, M.M., Cao, J.N., Li, J., Dasi, S.K.: Middleware for wireless sensor networks: A survey. Journal of Computer Science and Technology 23, 305–326 (2008)

    Article  Google Scholar 

  8. Newton, R., Morrisett, G., Welsh, M.: The regiment macroprogramming system. In: 6th International Conference on Information Processing in Sensor Networks, pp. 489–498. ACM, Cambridge (2007)

    Google Scholar 

  9. Westhoff, D., Girao, J., Sarma, A.: Security Solutions for Wireless Sensor Networks. NEC Tech. J. 1, 106–111 (2006)

    Google Scholar 

  10. Deng, J., Han, R., Mishra, S.: Secure code distribution in dynamically programmable wireless sensor networks. In: 5th International Conference on Information Processing in Sensor Networks, pp. 292–300. ACM, Nashville (2006)

    Google Scholar 

  11. The AspectJ Project, http://www.eclipse.org/aspectj

  12. SunSPOTWorld – Home, http://www.sunspotworld.org

  13. Gu, L., Stankovic, J.A.: t-kernel: providing reliable OS support to wireless sensor networks. In: 4th International Conference on Embedded Networked Sensor Systems, pp. 1–14. ACM, Boulder (2006)

    Google Scholar 

  14. Lobo, J., Bhatia, R., Naqvi, S.: A policy description language. In: Sixteenth National Conference on Artificial Intelligence and the Eleventh Innovative Applications of Artificial Intelligence Conference Innovative Applications of Artificial Intelligence, pp. 291–298. American Association for Artificial Intelligence, Orlando (1999)

    Google Scholar 

  15. Matthys, N., Hughes, D., Michiels, S., Huygens, C., Joosen, W.: Fine-Grained Tailoring of Component Behaviour for Embedded Systems. In: Lee, S., Narasimhan, P. (eds.) SEUS 2009. LNCS, vol. 5860, pp. 156–167. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  16. Van Stijn, E., Bjorn-Andersen, N., Razmerita, L., Henriksen, H.: Improving International e-Customs–The European ITAIDE Initiative. In: First International Conference on the Digital Society (ICDS 2007), p. 21. Guadeloupe, French Caribbean (2007)

    Chapter  Google Scholar 

  17. Integrity, http://www.integrity-supplychain.eu

  18. Sabbah, E., Majeed, A., Kang, K., Liu, K., Abu-Ghazaleh, N.: An application-driven perspective on wireless sensor network security. In: 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks, pp. 1–8. ACM, Terromolinos (2006)

    Google Scholar 

  19. Platon, E., Sei, Y.: Security software engineering in wireless sensor networks. Progress in Informatics 5, 49–64 (2008)

    Article  Google Scholar 

  20. Han, Q., Venkatasubramanian, N.: Information Collection Services for QoS-Aware Mobile Applications. IEEE Transactions on Mobile Computing 5, 518–535 (2006)

    Article  Google Scholar 

  21. Bischoff, U., Kortuem, G.: Life cycle support for sensor network applications. In: 2nd International Workshop on Middleware for Sensor Networks, pp. 1–6. ACM, Newport Beach (2007)

    Chapter  Google Scholar 

  22. Sadilek, D.A.: Energy-aware compilation for wireless sensor networks. In: 2nd International Workshop on Middleware for Sensor Networks, pp. 25–30. ACM, Newport Beach (2007)

    Chapter  Google Scholar 

  23. Tuohimaa, S., Leppänen, V.: A compact aspect-based security monitor for J2ME applications. In: 2007 International Conference on Computer Systems and Technologies, pp. 1–6. ACM, Bulgaria (2007)

    Chapter  Google Scholar 

  24. Walton, S., Eide, E.: Resource management aspects for sensor network software. In: 4th Workshop on Programming Languages and Operating Systems, pp. 1–5. ACM, Stevenson (2007)

    Google Scholar 

  25. Keoh, S., Twidle, K., Pryce, N., Lupu, E., Schaeffer Filho, A., Dulay, N., Sloman, M., Heeps, S., Strowes, S., Sventek, J.: Policy-based Management for Body-Sensor Networks. In: 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007), IFMBE Proceedings, vol. 13, pp. 92–98 (2007)

    Google Scholar 

  26. Russello, G., Mostarda, L., Dulay, N.: ESCAPE: A Component-Based Policy Framework for Sense and React Applications. In: Chaudron, M.R.V., Szyperski, C., Reussner, R. (eds.) CBSE 2008. LNCS, vol. 5282, pp. 212–229. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  27. Marsh, D.W., Baldwin, R.O., Mullins, B.E., Mills, R.F., Grimaila, M.R.: A security policy language for wireless sensor networks. J. Syst. Softw. 82, 101–111 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Huygens, C., Matthys, N., Joosen, W. (2010). Optimized Resource Access Control in Shared Sensor Networks. In: Schmidt, A.U., Russello, G., Lioy, A., Prasad, N.R., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 47. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17502-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17502-2_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17501-5

  • Online ISBN: 978-3-642-17502-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics