ABSTRACT
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained security support. Specifically, to allow sensor nodes to participate in multiple concurrent applications, access control is required on a per-application basis. This paper presents a policy-driven security architecture for wireless sensor networks that addresses the concern of fine-grained access control and secure deployment of security policies, while respecting the resource-constrained nature of wireless sensor networks. A prototype of this system has been realized and evaluated using the LooCI component model and the Sun SPOT sensor network platform.
- D. Hughes, K. Thoelen, W. Horré, N. Matthys, J. Del Cid, S. Michiels, C. Huygens, and W. Joosen. LooCI: a loosely-coupled component infrastructure for networked embedded systems. In Proceedings of MoMM'09, New York, NY, USA, Dec. 2009. ACM. Google ScholarDigital Library
- IWT STADiUM project 80037. Software technology for adaptable distributed middleware.Google Scholar
- N. Matthys, D. Hughes, S. Michiels, C. Huygens, and W. Joosen. Fine-grained tailoring of component behaviour for embedded systems. In The 7th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, November 2009. Google ScholarDigital Library
- A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. Spins: security protocols for sensor networks. Wirel. Netw., 8(5):521--534, 2002. Google ScholarDigital Library
- Sun SPOT World. http://www.sunspotworld.com/.Google Scholar
Index Terms
- Towards fine-grained and application-centric access control for wireless sensor networks
Recommendations
Group-based key predistribution for wireless sensor networks
Many key predistribution techniques have been developed recently to establish pairwise keys between sensor nodes in wireless sensor networks. To further improve these schemes, researchers have also proposed to take advantage of the sensors' expected ...
Securing network access in wireless sensor networks
WiSec '09: Proceedings of the second ACM conference on Wireless network securityIn wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In this paper, we present the design, implementation, and evaluation of a ...
Towards a new paradigm for securing wireless sensor networks
NSPW '03: Proceedings of the 2003 workshop on New security paradigmsThe network model assumed in this paper consists of tiny, energy-constrained, commodity sensors massively deployed alongside with one or more sink nodes that provide the interface to the outside world. The sensors in the network are initially anonymous ...
Comments