Title :
WINSOME: A middleware platform for the provision of secure monitoring services over Wireless Sensor Networks
Author :
Pomante, L. ; Pugliese, Marco ; Marchesani, S. ; Santucci, Fortunato
Author_Institution :
Center of Excellence DEWS, Univ. of L´Aquila, L´Aquila, Italy
Abstract :
This paper deals with the design and implementation of security mechanisms in networked embedded systems (e.g. Wireless Sensor Networks (WSN)), without the support of external “resource unconstrained” facilities. While most literature contributions propose to put intelligence (that is usually more consuming both in computational resources and in memory as well) outside the WSN, we have already reported in some previous works that, under certain limitations, a WSN can operate as a functionally “autonomous entity” not only for sensing operations. This paper provides a global overview of the related research project and then reports on recent design upgrades to what we denote as the “Secure Platform”, i.e. the SW platform over WSN that is able to support a wide range of applications in non-standard environment such as monitoring of critical infrastructures, data acquisition in hazardous environments under standard security conditions. The work presented here is a partial achievement of the internal project WINSOME (WIreless sensor Network-based Secure system fOr structural integrity Monitoring and AlErting) at our Centre DEWS, whose target is to develop a cross-layer secure framework for advanced monitoring and alerting applications.
Keywords :
condition monitoring; data acquisition; embedded systems; middleware; telecommunication computing; telecommunication security; wireless sensor networks; AlErting; Centre DEWS; WINSOME; WSN; autonomous entity; computational resources; critical infrastructures; cross-layer secure framework; data acquisition; hazardous environments; middleware platform; networked embedded systems; nonstandard environment; secure monitoring services; secure platform; standard security conditions; structural integrity monitoring; wireless sensor networks; Middleware; Monitoring; Network topology; Peer-to-peer computing; Security; Vectors; Wireless sensor networks; secure platform; security; security components; wireless sensor network;
Conference_Titel :
Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International
Conference_Location :
Sardinia
Print_ISBN :
978-1-4673-2479-3
DOI :
10.1109/IWCMC.2013.6583643