Security and Privacy in Mobile Information and Communication Systems. Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

Research Article

Optimized Resource Access Control in Shared Sensor Networks

Download
452 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-17502-2_9,
        author={Christophe Huygens and Nelson Matthys and Wouter Joosen},
        title={Optimized Resource Access Control in Shared Sensor Networks},
        proceedings={Security and Privacy in Mobile Information and Communication Systems. Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers},
        proceedings_a={MOBISEC},
        year={2012},
        month={5},
        keywords={Sensor Network security monitor policy aspect-oriented},
        doi={10.1007/978-3-642-17502-2_9}
    }
    
  • Christophe Huygens
    Nelson Matthys
    Wouter Joosen
    Year: 2012
    Optimized Resource Access Control in Shared Sensor Networks
    MOBISEC
    Springer
    DOI: 10.1007/978-3-642-17502-2_9
Christophe Huygens1,*, Nelson Matthys1,*, Wouter Joosen1,*
  • 1: K.U. Leuven
*Contact email: christophe.huygens@cs.kuleuven.be, nelson.matthys@cs.kuleuven.be, wouter.joosen@cs.kuleuven.be

Abstract

The security concern in wireless sensor networks is driven by the need for increased assurance regarding the system. In this light, research on protecting the network from threats originating from the hostile outside has been ongoing. Additionally, many real world applications of sensor networks move away from the monolithic application model – node capabilities need to be shared among different applications of different actors. This view introduces additional security requirements. This paper addresses controlled usage of resources, a primary security requirement in case of sensor sharing. A distributed reference monitor is proposed as the enforcement mechanism. The monitor is policy-driven which enables lightweight run-time control of the resource accesses. Resource constraints as well as current programming and operational models are respected through use of a selective injection strategy based on code rewriting during pre-deployment. Code rewriting is controlled by aspect-oriented constructs. The approach is validated by a research prototype.