Table of Contents
ISRN Communications and Networking
Volume 2012 (2012), Article ID 528374, 10 pages
http://dx.doi.org/10.5402/2012/528374
Research Article

A Security Adaptation Reference Monitor for Wireless Sensor Network

1Information Technology Department Hepia, University of Applied Sciences and Arts Western Switzerland, 1202 Geneva, Switzerland
2Advanced Systems Group, University of Geneva, 1211 Geneva 4, Switzerland

Received 14 March 2012; Accepted 19 April 2012

Academic Editors: K. Teh, Y. M. Tseng, and A. Vaccaro

Copyright © 2012 Tewfiq El-Maliki and Jean-Marc Seigneur. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Ibriq and I. Mahgoub, “Cluster-based routing in wireless sensor networks: issues and challenges,” in Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, San Jose, Calif, USA, July 2004.
  2. T. El Maliki and J. M. Seigneur, “A security adaptation reference monitor (SARM) for highly dynamic wireless environments,” in Proceedings of the 4th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '10), pp. 63–68, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Anderson, “ComputerSecurity Technology Planning,” http://seclab.cs.ucdavis.edu/projects/history/papers/ande72.pdf, 1972.
  4. C. Chigan, Y. Ye, and L. Li, “Balancing security against performance in wireless Ad Hoc and sensor networks,” in Proceedings of the 60th IEEE Vehicular Technology Conference (VTC '04), pp. 4735–4739, ETATS-UNIS, September 2004. View at Scopus
  5. M. W. Chiang, Z. Zilic, K. Radecka, and J. S. Chenard, “Architectures of increased availability wireless sensor network nodes,” in Proceedings of the International Test Conference 2004, pp. 1232–1241, October 2004. View at Scopus
  6. H. K. D. Sarma and A. Kar, “Security threats in wireless sensor networks,” in Proceedings of the 40th Annual IEEE International Carnahan Conference on Security Technology (ICCST '06), pp. 243–251, 2006. View at Publisher · View at Google Scholar · View at Scopus
  7. E. Shi and A. Perrig, “Designing secure sensor networks,” IEEE Wireless Communications, vol. 11, no. 6, pp. 38–43, 2004. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Communications Surveys & Tutorials, vol. 10, no. 3, pp. 6–28, 2008. View at Google Scholar
  9. J. Deng, R. Han, and S. Mishra, “INSENS: intrusion-tolerant routing in wireless sensor networks,” Tech. Rep. CU-CS-939-02, Department of Computer Science, University of Colorado, 2002. View at Google Scholar
  10. B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 243–254, ACM Press, August 2000. View at Scopus
  11. P. Papadimitratos and Z. J. Haas, “Secure routing for mobile Ad Hoc networks,” in Proceedings of the SCS Communication Networks and Distributed System Modeling and Simulation Conference (CNDS '02), 2002.
  12. S. Tanachaiwiwat, P. Dave, R. Bhindwale, and A. Helmy, “Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03), pp. 324–325, ACM Press, November 2003. View at Scopus
  13. D. Estrin, R. Govindan, J. S. Heidemann, and S. Kumar, “Next century challenges: scalable coordination in sensor networks,” in Proceedings of the Mobile Computing and Networking Conference, pp. 263–270, 1999.
  14. L. Hu and D. Evans, “Secure aggregation for wireless networks,” in Proceedings of the Symposium on Applications and the Internet Workshops (SAINT '03 Workshops), p. 384, IEEE Computer Society, 2003.
  15. S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, “Tag ‘a tiny aggregation service for Ad-Hoc sensor networks’,” ACM SIGOPS Operating Systems Review, vol. 36, pp. 131–146, 2002. View at Google Scholar
  16. B. Przydatek, D. Song, and A. Perrig, “SIA: secure information aggregation in sensor networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03), pp. 255–265, November 2003. View at Scopus
  17. M. Xiao, X. Wang, and G. Yang, “Cross-layer design for the security of wireless sensor networks,” in Proceedings of the 6th World Congress on Intelligent Control and Automation (WCICA '06), pp. 104–108, June 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Rafaeli and D. Hutchison, “A survey of key management for secure group communication,” ACM Computing Surveys, vol. 35, no. 3, pp. 309–329, 2003. View at Publisher · View at Google Scholar · View at Scopus
  19. X. Chen, K. Makki, K. Yen, and N. Pissinou, “Sensor network security: a survey,” IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 52–73, 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. Seigneur J. M., Trust, security and privacy in global computing, Ph.D. thesis, 2005.
  21. C. Hager, Context aware and adaptive security for wireless networks, Ph.D. thesis, Virginia Polytechnic Institute and State University, 2004.
  22. M. Lacoste, G. Privat, and F. Ramparany, “Evaluating confidence in context for context-aware security,” in Proceedings of the European Conference on Ambient Intelligence (AmI '07), 2007.
  23. J. Al-Muhtadi, D. Mickunas, and R. Campbell, “A lightweight reconfigurable security mechanism for 3G/4G mobile devices,” IEEE Wireless Communications, vol. 9, no. 2, pp. 60–65, 2002. View at Publisher · View at Google Scholar · View at Scopus
  24. E2R Deliverable D2.2, “Equipment Management Framework for Reconfiguration: Architecture, Interfaces, and Functions,” 2005.
  25. T. Jarboui, M. Lacoste, and P. Wadier, “A component-based policy-neutral authorization architecture,” in Proceedings of the French Conference on Operating Systems (CFSE '06), 2006.
  26. D. M. Chess and IBM Thomas J. Watson Research Center, “Security in autonomic computing,” ACM SIGARCH Computer Architecture News, vol. 33, no. 1, 2005. View at Publisher · View at Google Scholar
  27. D. M. Chess, C. C. Palmer, and S. R. White, “Security in an autonomic computing environment,” IBM Systems Journal, vol. 42, no. 1, pp. 107–118, 2003. View at Google Scholar · View at Scopus
  28. O. Powell, J. M. Seigneur, and L. Moraru, “Trustworthily forwarding sensor networks information to the internet,” in Proceedings of the International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE '07), pp. 30–35, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  29. A. A. Pirzada and C. McDonald, “Circumventing sinholes and wormholes in wireless sensor networks,” in Proceedings of the International Workshop on Wireless Ad-Hoc Networks, 2005.
  30. C. Davis, “A localized trust management scheme for Ad-Hoc networks,” in Proceedings of the 3rd International Conference on Networking (ICN '04), March 2004.
  31. L. Eschenauer, V. Gligor, and J. Baras, “On trust establishment in mobile Ad-Hoc networks,” in Proceedings of the 10th International Workshop of Security Protocols, Springer Lecture Notes in Computer Science (LNCS), April 2002.
  32. A. Rahman and A. Hailes, “A distributed trust model,” in Proceedings of the New Security Paradigms Workshop 1997, ACM, 1997.
  33. T. El Maliki and J. M. Seigneur, “Optimal Security Adaptation in Proximity-Based Wireless Networks,” Advance System Group Publication. Mobile Quality of Service. University of Geneva, 2009.
  34. J. M. Rabaey, M. J. Ammer, J. L. da Silva, D. Patel, and S. Roundy, “PicoRadio supports Ad Hoc ultra-low power wireless networking,” Computer, vol. 33, no. 7, pp. 42–48, 2000. View at Publisher · View at Google Scholar · View at Scopus
  35. B. Warneke, M. Last, B. Liebowitz, and K. S. J. Pister, “Smart dust: communicating with a cubic-millimeter computer,” Computer, vol. 34, no. 1, pp. 44–51, 2001. View at Google Scholar · View at Scopus
  36. M. J. Sailor and J. R. Link, “‘Smart dust’: nanostructured devices in a grain of sand,” Chemical Communications, no. 11, pp. 1375–1383, 2005. View at Publisher · View at Google Scholar · View at Scopus
  37. E. Felemban, S. Vural, R. Murawski et al., “SAMAC: a cross-layer communication protocol for sensor networks with sectored antennas,” IEEE Transactions on Mobile Computing, vol. 9, no. 8, pp. 1072–1088, 2010. View at Publisher · View at Google Scholar · View at Scopus
  38. M. A. Rahman, A. E. Saddik, and W. Gueaieb, “Wireless sensor network transport layer: state of the art,” in Sensors: Advancement in Modeling, Design Issues, Fabrication and Practical Applications, Springer, Berlin, Germany, 2008. View at Google Scholar