6th International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications

Research Article

A Middleware Approach to Provide Security in IEEE 802.15.4 Wireless Sensor Networks

Download35 downloads
  • @INPROCEEDINGS{10.4108/icst.mobilware.2013.254275,
        author={Stefano Marchesani and Luigi Pomante and Marco Pugliese and Fortunato Santucci},
        title={A Middleware Approach to Provide Security in IEEE 802.15.4 Wireless Sensor Networks},
        proceedings={6th International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications},
        publisher={IEEE},
        proceedings_a={MOBILWARE},
        year={2014},
        month={7},
        keywords={security middleware wireless sensor networks cryptographic scheme intrusion detection system},
        doi={10.4108/icst.mobilware.2013.254275}
    }
    
  • Stefano Marchesani
    Luigi Pomante
    Marco Pugliese
    Fortunato Santucci
    Year: 2014
    A Middleware Approach to Provide Security in IEEE 802.15.4 Wireless Sensor Networks
    MOBILWARE
    IEEE
    DOI: 10.4108/icst.mobilware.2013.254275
Stefano Marchesani1,*, Luigi Pomante1, Marco Pugliese1, Fortunato Santucci1
  • 1: University of L'Aquila - Center of Excellence DEWS
*Contact email: stefano.marchesani@graduate.univaq.it

Abstract

Last years have seen the growth of interest for middleware exploitation in distributed resource-constrained systems as Wireless Sensor Networks (WSNs) are. A WSN is a versatile smart sensing system to support pervasive monitoring in a variety of applications. In this context available middleware platforms usually provide the Application Layer with different basic services, as shared memory or addressing repository, but do not usually provide security services such as secure links management protocol or intrusion detection. Nevertheless, since WSN applications normally require the collection and the aggregation of reliable measurements and data from the sensing units, secure communications should be guaranteed even in the presence of resource constraints. In this paper we then present a novel middleware approach that is directly tailored to an IEEE 802.15.4-based WSN. The security-related components of the proposed middleware include a light yet powerful cryptographic scheme (TAKS) and an Intrusion Detection System (WIDS): the former module exploits the topological properties of a WSN, while the latter one is based on a Weak Process Model approach.