期刊文献+

Distributed Information Flow Verification for Secure Service Composition in Smart Sensor Network 被引量:3

Distributed Information Flow Verification for Secure Service Composition in Smart Sensor Network
下载PDF
导出
摘要 Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance. Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance.
出处 《China Communications》 SCIE CSCD 2016年第4期119-130,共12页 中国通信(英文版)
基金 supported in part by National Natural Science Foundation of China(61502368,61303033,U1135002 and U1405255) the National High Technology Research and Development Program(863 Program)of China(No.2015AA017203) the Fundamental Research Funds for the Central Universities(XJS14072,JB150308) the Aviation Science Foundation of China(No.2013ZC31003,20141931001)
关键词 information flow security service composition formal verification smart sensor network information flow security servicecomposition formal verification smart sensornetwork
  • 相关文献

参考文献20

  • 1Ciancetta, F., D'ApJce, B., GaJJo, D.," Landi, C., "Plug-n-Play Smart Sensor Network With Dy- namic Web Service", IEEE Transactions on In- strumentation and Measurement, vol.ST, no.10, pp.2136-2145, Oct. 2008.
  • 2Mingfu Li; Hung-Ju Lin. "Design and Implemen- tation of Smart Home Control Systems Based on Wireless Sensor Networks and Power Line Communications", IEEE Transactions on Indus- trial Electronics,, vol.62, no.7, pp.4430-4442, July 2015.
  • 3Adamo, I=.; Attivissimo, F.; Carducci, C.G.C.; Lan- 2011a, A.M.L., "A Smart Sensor Network for Sea Water Quality Monitoring", IEEE Sensors Jour- nal, vol.15, no.5, pp.2514-2522, May 2015.
  • 4A. Rezgui and M. Fltoweissy, "Service-Oriented Sensor Actuator Network". IEEE Communica- tions, Vol.45, No.12, pp.92-100, December 2007.
  • 5Bertino E., Squicciarini A.C. and Mevi D., "A Fine- grained Access Control Model for Web Ser- vices", SCC, pp.33-40, 2004.
  • 6Bhatti R., Bertino E., and Ghafoor A., "A Trust- based on text-aware Access Control Model for Web-services", ICWS, pp.184-191, 2004.
  • 7Rafael Accorsi and Claus Wonnemann, "Static Information Flow Analysis of Workflow Models" INFOR- MATIK 2010 -Business Process and Ser- vice Science - Proceedings of ISSS and BPSC, vo1.177 of LNI, pp.194-205, 2010.
  • 8D. Hutter, Mo Volkamer, "Information flow con- trol to secure dynamic web service composi- tion", in, Security in Pervasive Computing, vol. 3934 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2006, pp. 196-210.
  • 9S. Nakajima, "Model-checking of safety and se-curity aspects in web service flows", in: N. Koch P. Fraternali, M Wirsing (Eds.), Web Engineering vol. 3140 of Lecture Notes in Computer Science Springer Berlin Heidelberg, 2004, pp. 488-501.
  • 10S, Rossi, Model checking adaptive multilevel service compositions, in: L. Barbosa, M. Lumpe (Eds.), "Formal Aspects of Component Soft- ware", vol. 6921 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2012, pp. 106-124.

同被引文献10

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部