AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications

Moya Fernández, José Manuel ORCID: https://orcid.org/0000-0003-4433-2296, Vallejo López, Juan Carlos, Malagón Marzo, Pedro José ORCID: https://orcid.org/0000-0002-8167-508X, Araujo Pinto, Álvaro ORCID: https://orcid.org/0000-0001-9269-5900, Goyeneche, Juan Mariano de and Nieto-Taladriz García, Octavio ORCID: https://orcid.org/0000-0003-1411-6947 (2008). AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications. "International Journal on Advances in Security", v. 1 (n. 1); pp. 15-25. ISSN 1942-2636.

Descripción

Título: AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications
Autor/es:
Tipo de Documento: Artículo
Título de Revista/Publicación: International Journal on Advances in Security
Fecha: 2008
ISSN: 1942-2636
Volumen: 1
Número: 1
Materias:
ODS:
Palabras Clave Informales: Ambient intelligence, reputation system, security framework for wireless sensor networks
Escuela: E.T.S.I. Telecomunicación (UPM)
Departamento: Ingeniería Electrónica
Licencias Creative Commons: Reconocimiento - Sin obra derivada - No comercial

Texto completo

[thumbnail of INVE_MEM_2008_59443.pdf]
Vista Previa
PDF (Portable Document Format) - Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (733kB) | Vista Previa

Resumen

Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in previous approaches, we assume an individual wireless node is vulnerable. We present an agent-based architecture with supporting services that is proven to be adequate to detect and confine common attacks. Decisions at different levels are supported by a trust-based framework with good and bad reputation feedback while maintaining resistance to bad-mouthing attacks. We also propose a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients. The resulting approach takes into account practical issues, such as resource limitation, bandwidth optimization, and scalability.

Más información

ID de Registro: 2847
Identificador DC: https://oa.upm.es/2847/
Identificador OAI: oai:oa.upm.es:2847
URL Oficial: http://www.iariajournals.org/security/index.html
Depositado por: Memoria Investigacion
Depositado el: 14 Abr 2010 08:34
Ultima Modificación: 20 Abr 2016 12:29