A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION

Antonio Vincenzo Taddeo, Luis Germán García Morales, Alberto Ferrante

2011

Abstract

Providing a balanced trade-off among performances, security, and energy consumption is a key challenge in embedded systems. Traditional security solutions assume a well-known and static operating environment, thus leading to a static system configuration that cannot be tailed to the system conditions. Wireless sensor networks are a good example of typical embedded systems. In this work we propose a framework that reduces energy consumption in nodes of wireless sensor networks. The framework allows the system to self-modify its security and workload settings. Adaptations are performed by moving to adjacent configuration and, thus, this mechanism is named gradual adaptation. In this paper we discuss the policies that can be used to control the adaptations and we present the results obtained when implementing a case study on Sun SPOT nodes. The results show that the use of the framework increases the energy efficiency of the network nodes. Furthermore, they show the effects of the different policies on the behavior of nodes.

References

  1. Chandramouli, R., Bapatla, S., Subbalakshmi, K. P., and Uma, R. N. (2006). Battery power-aware encryption. ACM Trans. Inf. Syst. Secur., 9(2):162-180.
  2. Chandramouli, R., Bapatla, S., Subbalakshmi, K. P., and Uma, R. N. (2006). Battery power-aware encryption. ACM Trans. Inf. Syst. Secur., 9(2):162-180.
  3. Chigan, C., Li, L., and Ye, Y. (2005). Resource-aware selfadaptive security provisioning in mobile ad hoc networks. In Wireless Communications and Networking Conference, 2005 IEEE, volume 4, pages 2118-2124.
  4. Chigan, C., Li, L., and Ye, Y. (2005). Resource-aware selfadaptive security provisioning in mobile ad hoc networks. In Wireless Communications and Networking Conference, 2005 IEEE, volume 4, pages 2118-2124.
  5. El-Hennawy, M. E., Dakroury, Y. H., Kouta, M. M., and El-Gendy, M. M. (2004). An adaptive security/performance encryption system. In Proc. International Conference on Electrical, Electronic and Computer Engineering ICEEC 7804, pages 245-248.
  6. El-Hennawy, M. E., Dakroury, Y. H., Kouta, M. M., and El-Gendy, M. M. (2004). An adaptive security/performance encryption system. In Proc. International Conference on Electrical, Electronic and Computer Engineering ICEEC 7804, pages 245-248.
  7. Ferrante, A., Piuri, V., and Owen, J. (2005). IPSec Hardware Resource Requirements Evaluation. In NGI 2005, Rome, Italy. EuroNGI.
  8. Ferrante, A., Piuri, V., and Owen, J. (2005). IPSec Hardware Resource Requirements Evaluation. In NGI 2005, Rome, Italy. EuroNGI.
  9. Grossschädl, J., Szekely, A., and Tillich, S. (2007). The energy cost of cryptographic key establishment in wireless sensor networks. In ASIACCS 7807: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pages 380-382, New York, NY, USA. ACM.
  10. Grossschädl, J., Szekely, A., and Tillich, S. (2007). The energy cost of cryptographic key establishment in wireless sensor networks. In ASIACCS 7807: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pages 380-382, New York, NY, USA. ACM.
  11. Herlihy, M. and Wing, J. (1991). Specifying graceful degradation. Parallel and Distributed Systems, IEEE Transactions on, 2(1):93-104.
  12. Herlihy, M. and Wing, J. (1991). Specifying graceful degradation. Parallel and Distributed Systems, IEEE Transactions on, 2(1):93-104.
  13. Karri, R. and Mishra, P. (2002). Minimizing energy consumption of secure wireless session with qos constraints. In Proc. IEEE International Conference on Communications ICC 2002, volume 4, pages 2053- 2057.
  14. Karri, R. and Mishra, P. (2002). Minimizing energy consumption of secure wireless session with qos constraints. In Proc. IEEE International Conference on Communications ICC 2002, volume 4, pages 2053- 2057.
  15. Keeratiwintakorn, P. and Krishnamurthy, P. (2006). Energy efficient security services for limited wireless devices. In Proc. 1st International Symposium on Wireless Pervasive Computing, pages 1-6.
  16. Keeratiwintakorn, P. and Krishnamurthy, P. (2006). Energy efficient security services for limited wireless devices. In Proc. 1st International Symposium on Wireless Pervasive Computing, pages 1-6.
  17. Li, J., Song, Y., and Simonot-Lion, F. (2006). Providing real-time applications with graceful degradation of qos and fault tolerance according to (m, k) -firm model. Industrial Informatics, IEEE Transactions on, 2(2):112-119.
  18. Li, J., Song, Y., and Simonot-Lion, F. (2006). Providing real-time applications with graceful degradation of qos and fault tolerance according to (m, k) -firm model. Industrial Informatics, IEEE Transactions on, 2(2):112-119.
  19. Lighfoot, L., Ren, J., and Li, T. (2007). An energy efficient link-layer security protocol for wireless sensor networks. In Electro/Information Technology, 2007 IEEE International Conference on, pages 233-238.
  20. Lighfoot, L., Ren, J., and Li, T. (2007). An energy efficient link-layer security protocol for wireless sensor networks. In Electro/Information Technology, 2007 IEEE International Conference on, pages 233-238.
  21. Microsystems, S. (2008). Sun Small Programmable Object Technology.
  22. Microsystems, S. (2008). Sun Small Programmable Object Technology.
  23. Mura, M. (2007). Ultra-low power optimizations for the ieee 802.15.4 networking protocol. In proceedings of MASS.
  24. Mura, M. (2007). Ultra-low power optimizations for the ieee 802.15.4 networking protocol. In proceedings of MASS.
  25. Pfleeger, C. P. and Pfleeger, S. L. (2006). Security in Computing, 4th Edition. Prentice Hall PTR, 4th edition.
  26. Pfleeger, C. P. and Pfleeger, S. L. (2006). Security in Computing, 4th Edition. Prentice Hall PTR, 4th edition.
  27. Ravi, S., Raghunathan, A., Kocher, P., and Hattangady, S. (2004). Security in embedded systems: Design challenges. Trans. on Embedded Computing Sys., 3(3):461-491.
  28. Ravi, S., Raghunathan, A., Kocher, P., and Hattangady, S. (2004). Security in embedded systems: Design challenges. Trans. on Embedded Computing Sys., 3(3):461-491.
  29. Taddeo, A. V., Micconi, L., and Ferrante, A. (2010). Gradual adaptation of security for sensor networks. In IEEE WoWMoM 2010: Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Montreal, Canada.
  30. Taddeo, A. V., Micconi, L., and Ferrante, A. (2010). Gradual adaptation of security for sensor networks. In IEEE WoWMoM 2010: Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Montreal, Canada.
Download


Paper Citation


in Harvard Style

Vincenzo Taddeo A., Germán García Morales L. and Ferrante A. (2011). A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 178-187. DOI: 10.5220/0003522001780187


in Harvard Style

Vincenzo Taddeo A., Germán García Morales L. and Ferrante A. (2011). A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 178-187. DOI: 10.5220/0003522001780187


in Bibtex Style

@conference{secrypt11,
author={Antonio Vincenzo Taddeo and Luis Germán García Morales and Alberto Ferrante},
title={A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={178-187},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003522001780187},
isbn={978-989-8425-71-3},
}


in Bibtex Style

@conference{secrypt11,
author={Antonio Vincenzo Taddeo and Luis Germán García Morales and Alberto Ferrante},
title={A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={178-187},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003522001780187},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION
SN - 978-989-8425-71-3
AU - Vincenzo Taddeo A.
AU - Germán García Morales L.
AU - Ferrante A.
PY - 2011
SP - 178
EP - 187
DO - 10.5220/0003522001780187


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION
SN - 978-989-8425-71-3
AU - Vincenzo Taddeo A.
AU - Germán García Morales L.
AU - Ferrante A.
PY - 2011
SP - 178
EP - 187
DO - 10.5220/0003522001780187