Skip to main content

A Framework for Dynamic Optimization of Security and Performances

  • Conference paper
E-Business and Telecommunications (ICETE 2011)

Abstract

Implementing security solutions in embedded systems is challenging due to their intrinsic limitations on performances as well as on available energy. Furthermore, traditional security solutions, designed by assuming static environments, do not provide the ability to tail security to the current operational conditions of the system. Thus, the efficiency and the applicability of security solutions to embedded dynamic applications, such as the ones often used in wireless sensor networks, are often limited.

In this paper we introduce a solution to this problem by proposing a framework in which gradual adaptation of security is provided: the system is able to adjust security and workload settings depending on the current operating conditions. The adaptation is performed moving through adjacent configurations. In this paper we discuss the policies that can be used to control the adaptations and we present the results obtained when implementing a case study on Sun SPOT nodes. The results show that the use of the framework increases the energy efficiency of the network nodes. Furthermore, they show the effects of different adaptation policies on the behavior of nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mura, M.: Ultra-low power optimizations for the ieee 802.15.4 networking protocol. In: Proceedings of MASS (2007)

    Google Scholar 

  2. Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: Design challenges. Trans. on Embedded Computing Sys. 3, 461–491 (2004)

    Article  Google Scholar 

  3. Ferrante, A., Piuri, V., Owen, J.: IPSec Hardware Resource Requirements Evaluation. In: NGI 2005, Rome, Italy. EuroNGI (2005)

    Google Scholar 

  4. Keeratiwintakorn, P., Krishnamurthy, P.: Energy efficient security services for limited wireless devices. In: Proc. 1st International Symposium on Wireless Pervasive Computing, pp. 1–6 (2006)

    Google Scholar 

  5. Grossschädl, J., Szekely, A., Tillich, S.: The energy cost of cryptographic key establishment in wireless sensor networks. In: ASIACCS 2007: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 380–382. ACM, New York (2007)

    Chapter  Google Scholar 

  6. Chandramouli, R., Bapatla, S., Subbalakshmi, K.P., Uma, R.N.: Battery power-aware encryption. ACM Trans. Inf. Syst. Secur. 9, 162–180 (2006)

    Article  Google Scholar 

  7. Chigan, C., Li, L., Ye, Y.: Resource-aware self-adaptive security provisioning in mobile ad hoc networks. In: 2005 IEEE Wireless Communications and Networking Conference, vol. 4, pp. 2118–2124 (2005)

    Google Scholar 

  8. Lighfoot, L., Ren, J., Li, T.: An energy efficient link-layer security protocol for wireless sensor networks. In: 2007 IEEE International Conference on Electro/Information Technology, pp. 233–238 (2007)

    Google Scholar 

  9. Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 4th edn. Prentice Hall PTR (2006)

    Google Scholar 

  10. Microsystems, S.: Sun Small Programmable Object Technology (2008)

    Google Scholar 

  11. Herlihy, M., Wing, J.: Specifying graceful degradation. IEEE Transactions on Parallel and Distributed Systems 2, 93–104 (1991)

    Article  Google Scholar 

  12. Li, J., Song, Y., Simonot-Lion, F.: Providing real-time applications with graceful degradation of qos and fault tolerance according to (m, k) -firm model. IEEE Transactions on Industrial Informatics 2, 112–119 (2006)

    Article  Google Scholar 

  13. Karri, R., Mishra, P.: Minimizing energy consumption of secure wireless session with qos constraints. In: Proc. IEEE International Conference on Communications, ICC 2002, vol. 4, pp. 2053–2057 (2002)

    Google Scholar 

  14. El-Hennawy, M.E., Dakroury, Y.H., Kouta, M.M., El-Gendy, M.M.: An adaptive security/performance encryption system. In: Proc. International Conference on Electrical, Electronic and Computer Engineering, ICEEC 2004, pp. 245–248 (2004)

    Google Scholar 

  15. Taddeo, A.V., Micconi, L., Ferrante, A.: Gradual adaptation of security for sensor networks. In: IEEE WoWMoM 2010: Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Montreal, Canada (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Taddeo, A.V., García Morales, L.G., Ferrante, A. (2012). A Framework for Dynamic Optimization of Security and Performances. In: Obaidat, M.S., Sevillano, J.L., Filipe, J. (eds) E-Business and Telecommunications. ICETE 2011. Communications in Computer and Information Science, vol 314. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35755-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35755-8_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35754-1

  • Online ISBN: 978-3-642-35755-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics