Skip to main content

USN Middleware Security Model

  • Conference paper
Information Security Applications (WISA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5932))

Included in the following conference series:

  • 1120 Accesses

Abstract

In recent years, USN technology has become one of the major issues in business and academia. This paper analyzes USN services from a security point of view and proposes a security model of USN middleware that plays a bridge role in linking heterogeneous sensor network to USN applications. In USN environment, sensor networks transmit data sensed from all distributed sensor nodes to USN middleware. And then USN middleware processes the received sensing data, makes information for supporting specific application service, and transmits the information to appropriate USN application. Like this, USN middleware plays a significant role in USN service. If the USN middleware is compromised, USN service might be not functioning normally. Hence, security in USN middleware is very important. In this paper, we propose security functions in USN middleware and specify a USN middleware security model that the security functions are reflected in.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ITU-T X.800, Security architecture for Open Systems Interconnection for CCITT applications

    Google Scholar 

  2. ITU-T X.805, Security architecture for systems providing end-to-end communications

    Google Scholar 

  3. ITU-T F.usn-mw, Service description and requirements for USN middleware

    Google Scholar 

  4. ITU-T X.usnsec-1, security framework for ubiquitous sensor network

    Google Scholar 

  5. ITU-T X.usnsec-2, USN middleware security guideline

    Google Scholar 

  6. ITU-T X.usnsec-3, Secure routing mechanisms for wireless sensor network

    Google Scholar 

  7. Sabbah, E., Majeed, A., Kang, K.-D., Liu, K., Abu-Ghazaleh, N.: An Application-Driven Perspective on Wireless Sensor Network Security, Q2SWinet 2006 (2006)

    Google Scholar 

  8. Heinzelman, W., Murphy, A., Carvalho, H., Perillo, M.: Middleware to Support Sensor Network Applications. IEEE Network Magazine Special Issue (January 2004)

    Google Scholar 

  9. Li, S., Son, S.H., Stankovic, J.A.: Event detection services using data service middleware in distributed sensor networks. In: Zhao, F., Guibas, L.J. (eds.) IPSN 2003. LNCS, vol. 2634, pp. 502–517. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Liu, T., Martonosi, M.: Impala: A Middleware System for Managing Autonomic, Parallel Sensor Systems In: Proc. ACM SIGPLAN Symp. Principles and Practice of Parallel Programming, pp. 107–118 (2003)

    Google Scholar 

  11. Madden, S.R., Franklin, M.J., Hellerstein, J.M.: TinyDB: An Acquisitional Query Processing System for Sensor Networks. ACM TODS 30(1), 122–173 (2005)

    Article  Google Scholar 

  12. Yao, Y., Gehrke, J.E.: The Cougar Approach to In-Network Query Processing in Sensor Networks. SIGMOD RECORD 31(3) (2002)

    Google Scholar 

  13. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Ad Hoc Networks 1(2-3), 293–315 (2003)

    Article  Google Scholar 

  14. Loo, C., Ng, M., Leckie, C., Palaniswami, M.: Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks 2(4), 313–332 (2006)

    Article  Google Scholar 

  15. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier’s AdHoc Networks Journal (2002)

    Google Scholar 

  16. Undercoffer, J., Avancha, S., Joshi, A., Pinkston, J.: Security for Sensor Networks. CADIP Research Symposium (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, M., Yoon, M.Y., Jeong, H.C., Youm, H.Y. (2009). USN Middleware Security Model. In: Youm, H.Y., Yung, M. (eds) Information Security Applications. WISA 2009. Lecture Notes in Computer Science, vol 5932. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10838-9_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10838-9_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10837-2

  • Online ISBN: 978-3-642-10838-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics