AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications

Moya Fernández, José Manuel and Vallejo López, Juan Carlos and Malagón Marzo, Pedro José and Araujo Pinto, Álvaro and Goyeneche, Juan Mariano de and Nieto-Taladriz García, Octavio (2008). AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications. "International Journal on Advances in Security", v. 1 (n. 1); pp. 15-25. ISSN 1942-2636.

Description

Title: AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications
Author/s:
  • Moya Fernández, José Manuel
  • Vallejo López, Juan Carlos
  • Malagón Marzo, Pedro José
  • Araujo Pinto, Álvaro
  • Goyeneche, Juan Mariano de
  • Nieto-Taladriz García, Octavio
Item Type: Article
Título de Revista/Publicación: International Journal on Advances in Security
Date: 2008
ISSN: 1942-2636
Volume: 1
Subjects:
Freetext Keywords: Ambient intelligence, reputation system, security framework for wireless sensor networks
Faculty: E.T.S.I. Telecomunicación (UPM)
Department: Ingeniería Electrónica
Creative Commons Licenses: Recognition - No derivative works - Non commercial

Full text

[img]
Preview
PDF - Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (733kB) | Preview

Abstract

Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in previous approaches, we assume an individual wireless node is vulnerable. We present an agent-based architecture with supporting services that is proven to be adequate to detect and confine common attacks. Decisions at different levels are supported by a trust-based framework with good and bad reputation feedback while maintaining resistance to bad-mouthing attacks. We also propose a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients. The resulting approach takes into account practical issues, such as resource limitation, bandwidth optimization, and scalability.

More information

Item ID: 2847
DC Identifier: http://oa.upm.es/2847/
OAI Identifier: oai:oa.upm.es:2847
Official URL: http://www.iariajournals.org/security/index.html
Deposited by: Memoria Investigacion
Deposited on: 14 Apr 2010 08:34
Last Modified: 20 Apr 2016 12:29
  • Logo InvestigaM (UPM)
  • Logo GEOUP4
  • Logo Open Access
  • Open Access
  • Logo Sherpa/Romeo
    Check whether the anglo-saxon journal in which you have published an article allows you to also publish it under open access.
  • Logo Dulcinea
    Check whether the spanish journal in which you have published an article allows you to also publish it under open access.
  • Logo de Recolecta
  • Logo del Observatorio I+D+i UPM
  • Logo de OpenCourseWare UPM