Texto completo
Vista Previa |
PDF (Portable Document Format)
- Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (733kB) | Vista Previa |
ORCID: https://orcid.org/0000-0003-4433-2296, Vallejo López, Juan Carlos, Malagón Marzo, Pedro José
ORCID: https://orcid.org/0000-0002-8167-508X, Araujo Pinto, Álvaro
ORCID: https://orcid.org/0000-0001-9269-5900, Goyeneche, Juan Mariano de and Nieto-Taladriz García, Octavio
ORCID: https://orcid.org/0000-0003-1411-6947
(2008).
AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications.
"International Journal on Advances in Security", v. 1
(n. 1);
pp. 15-25.
ISSN 1942-2636.
| Título: | AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications |
|---|---|
| Autor/es: |
|
| Tipo de Documento: | Artículo |
| Título de Revista/Publicación: | International Journal on Advances in Security |
| Fecha: | 2008 |
| ISSN: | 1942-2636 |
| Volumen: | 1 |
| Número: | 1 |
| Materias: | |
| ODS: | |
| Palabras Clave Informales: | Ambient intelligence, reputation system, security framework for wireless sensor networks |
| Escuela: | E.T.S.I. Telecomunicación (UPM) |
| Departamento: | Ingeniería Electrónica |
| Licencias Creative Commons: | Reconocimiento - Sin obra derivada - No comercial |
Vista Previa |
PDF (Portable Document Format)
- Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (733kB) | Vista Previa |
Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in previous approaches, we assume an individual wireless node is vulnerable. We present an agent-based architecture with supporting services that is proven to be adequate to detect and confine common attacks. Decisions at different levels are supported by a trust-based framework with good and bad reputation feedback while maintaining resistance to bad-mouthing attacks. We also propose a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients. The resulting approach takes into account practical issues, such as resource limitation, bandwidth optimization, and scalability.
| ID de Registro: | 2847 |
|---|---|
| Identificador DC: | https://oa.upm.es/2847/ |
| Identificador OAI: | oai:oa.upm.es:2847 |
| URL Oficial: | http://www.iariajournals.org/security/index.html |
| Depositado por: | Memoria Investigacion |
| Depositado el: | 14 Abr 2010 08:34 |
| Ultima Modificación: | 20 Abr 2016 12:29 |
Publicar en el Archivo Digital desde el Portal Científico