AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications

Moya Fernández, José Manuel; Vallejo López, Juan Carlos; Malagón Marzo, Pedro José; Araujo Pinto, Álvaro; Goyeneche, Juan Mariano de y Nieto-Taladriz García, Octavio (2008). AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications. "International Journal on Advances in Security", v. 1 (n. 1); pp. 15-25. ISSN 1942-2636.

Descripción

Título: AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications
Autor/es:
  • Moya Fernández, José Manuel
  • Vallejo López, Juan Carlos
  • Malagón Marzo, Pedro José
  • Araujo Pinto, Álvaro
  • Goyeneche, Juan Mariano de
  • Nieto-Taladriz García, Octavio
Tipo de Documento: Artículo
Título de Revista/Publicación: International Journal on Advances in Security
Fecha: 2008
Volumen: 1
Materias:
Palabras Clave Informales: Ambient intelligence, reputation system, security framework for wireless sensor networks
Escuela: E.T.S.I. Telecomunicación (UPM)
Departamento: Ingeniería Electrónica
Licencias Creative Commons: Reconocimiento - Sin obra derivada - No comercial

Texto completo

[img]
Vista Previa
PDF (Document Portable Format) - Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (733kB) | Vista Previa

Resumen

Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in previous approaches, we assume an individual wireless node is vulnerable. We present an agent-based architecture with supporting services that is proven to be adequate to detect and confine common attacks. Decisions at different levels are supported by a trust-based framework with good and bad reputation feedback while maintaining resistance to bad-mouthing attacks. We also propose a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients. The resulting approach takes into account practical issues, such as resource limitation, bandwidth optimization, and scalability.

Más información

ID de Registro: 2847
Identificador DC: http://oa.upm.es/2847/
Identificador OAI: oai:oa.upm.es:2847
URL Oficial: http://www.iariajournals.org/security/index.html
Depositado por: Memoria Investigacion
Depositado el: 14 Abr 2010 08:34
Ultima Modificación: 20 Abr 2016 12:29
  • Open Access
  • Open Access
  • Sherpa-Romeo
    Compruebe si la revista anglosajona en la que ha publicado un artículo permite también su publicación en abierto.
  • Dulcinea
    Compruebe si la revista española en la que ha publicado un artículo permite también su publicación en abierto.
  • Recolecta
  • e-ciencia
  • Observatorio I+D+i UPM
  • OpenCourseWare UPM