System design methodologies for a wireless security processing platform
Proceedings of the 39th annual Design Automation Conference
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Landmark routing in ad hoc networks with mobile backbones
Journal of Parallel and Distributed Computing - Special issue on Routing in mobile and wireless ad hoc networks
Distributed Clustering for Ad Hoc Networks
ISPAN '99 Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms and Networks
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Proceedings of the 43rd annual Design Automation Conference
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Securing distributed data storage and retrieval in sensor networks
Pervasive and Mobile Computing
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor
SECUREWARE '07 Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies
Statistical wormhole detection in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Adaptive clustering for mobile wireless networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in previous approaches, we assume an individual wireless node is vulnerable. We present an agent-based architecture with supporting services that is proven to be adequate to detect and confine common attacks. Decisions at different levels are supported by a trust-based framework with good and bad reputation feedback while maintaining resistance to bad-mouthing attacks. We also propose a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients. The resulting approach takes into account practical issues, such as resource limitation, bandwidth optimization, and scalability.