Abstract
In recent years, USN technology has become one of the major issues in business and academia. This paper analyzes USN services from a security point of view and proposes a security model of USN middleware that plays a bridge role in linking heterogeneous sensor network to USN applications. In USN environment, sensor networks transmit data sensed from all distributed sensor nodes to USN middleware. And then USN middleware processes the received sensing data, makes information for supporting specific application service, and transmits the information to appropriate USN application. Like this, USN middleware plays a significant role in USN service. If the USN middleware is compromised, USN service might be not functioning normally. Hence, security in USN middleware is very important. In this paper, we propose security functions in USN middleware and specify a USN middleware security model that the security functions are reflected in.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ITU-T X.800, Security architecture for Open Systems Interconnection for CCITT applications
ITU-T X.805, Security architecture for systems providing end-to-end communications
ITU-T F.usn-mw, Service description and requirements for USN middleware
ITU-T X.usnsec-1, security framework for ubiquitous sensor network
ITU-T X.usnsec-2, USN middleware security guideline
ITU-T X.usnsec-3, Secure routing mechanisms for wireless sensor network
Sabbah, E., Majeed, A., Kang, K.-D., Liu, K., Abu-Ghazaleh, N.: An Application-Driven Perspective on Wireless Sensor Network Security, Q2SWinet 2006 (2006)
Heinzelman, W., Murphy, A., Carvalho, H., Perillo, M.: Middleware to Support Sensor Network Applications. IEEE Network Magazine Special Issue (January 2004)
Li, S., Son, S.H., Stankovic, J.A.: Event detection services using data service middleware in distributed sensor networks. In: Zhao, F., Guibas, L.J. (eds.) IPSN 2003. LNCS, vol. 2634, pp. 502–517. Springer, Heidelberg (2003)
Liu, T., Martonosi, M.: Impala: A Middleware System for Managing Autonomic, Parallel Sensor Systems In: Proc. ACM SIGPLAN Symp. Principles and Practice of Parallel Programming, pp. 107–118 (2003)
Madden, S.R., Franklin, M.J., Hellerstein, J.M.: TinyDB: An Acquisitional Query Processing System for Sensor Networks. ACM TODS 30(1), 122–173 (2005)
Yao, Y., Gehrke, J.E.: The Cougar Approach to In-Network Query Processing in Sensor Networks. SIGMOD RECORDÂ 31(3) (2002)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Ad Hoc Networks 1(2-3), 293–315 (2003)
Loo, C., Ng, M., Leckie, C., Palaniswami, M.: Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks 2(4), 313–332 (2006)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier’s AdHoc Networks Journal (2002)
Undercoffer, J., Avancha, S., Joshi, A., Pinkston, J.: Security for Sensor Networks. CADIP Research Symposium (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, M., Yoon, M.Y., Jeong, H.C., Youm, H.Y. (2009). USN Middleware Security Model. In: Youm, H.Y., Yung, M. (eds) Information Security Applications. WISA 2009. Lecture Notes in Computer Science, vol 5932. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10838-9_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-10838-9_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10837-2
Online ISBN: 978-3-642-10838-9
eBook Packages: Computer ScienceComputer Science (R0)