CFP last date
20 December 2024
Reseach Article

Understanding Total System Assurance: the Case of Mobile Agent-based Wireless Sensor Network Systems

Published on None 2011 by Kassem Saleh
Wireless Information Networks & Business Information System
Foundation of Computer Science USA
WINBIS - Number 1
None 2011
Authors: Kassem Saleh
d7d3d81c-4d48-4c02-9758-fe648245ca4e

Kassem Saleh . Understanding Total System Assurance: the Case of Mobile Agent-based Wireless Sensor Network Systems. Wireless Information Networks & Business Information System. WINBIS, 1 (None 2011), 26-32.

@article{
author = { Kassem Saleh },
title = { Understanding Total System Assurance: the Case of Mobile Agent-based Wireless Sensor Network Systems },
journal = { Wireless Information Networks & Business Information System },
issue_date = { None 2011 },
volume = { WINBIS },
number = { 1 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 26-32 },
numpages = 7,
url = { /proceedings/winbis/number1/2044-191/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Wireless Information Networks & Business Information System
%A Kassem Saleh
%T Understanding Total System Assurance: the Case of Mobile Agent-based Wireless Sensor Network Systems
%J Wireless Information Networks & Business Information System
%@ 0975-8887
%V WINBIS
%N 1
%P 26-32
%D 2011
%I International Journal of Computer Applications
Abstract

Total System Assurance (TSA) deals with assuring the security of all system components by considering all potential risks. This comprehensive approach to system assurance tackles security from multiple points of views, thus ensuring the highest possible level of assurance. In this paper we illustrate the TSA approach by considering a complex system running a mobile agent-based wireless sensor network (MA-WSN). Security in WSNs has been addressed extensively in the literature, however a comprehensive and integrative system security and assurance has not been considered. Total assurance in MA-WSN applications relies on the security of the mobile agents, and the mobile agent platform, in addition to the security of the wireless sensors and the application servers. Total assurance is tackled in a generic and comprehensive manner by considering a mixture of three approaches to addressing security concerns in systems. These approaches are based on the elicitation of security requirements, the misuse case-based threat model, and the prevention-detection-response model.

References
  1. C. Pfleeger and S. Pfleeger, Security in Computing, Prentice Hall, 4th edition, 2006.
  2. J.P. Walters et al., Wireless sensor networks security: A Survey, Chapter 17, Security in Distributed, Grid and Prevasive Computing, CRC Press, 2006.
  3. W. Cockayne, and M. Zyda, (1998), Mobile Agents, Manning, Pearson Education, Harlow.
  4. Kiniry, J. and Zimmerman, D. (1997), ``A hands-on look at Java mobile agents’’, IEEE Internet Computing, July, pp. 21-30.
  5. D. Lange and M. Oshima, Programming and Deploying Java Mobile Agents with Aglets, Addison-Wesley, 1998.
  6. M. Chen, et al., “Applications and design issues for mobile agents in wireless networks”, IEEE Wireless Communications, December 2007, pp. 20-26.
  7. G. Karjoth et al., ‘A security model for Aglets’, IEEE Internet Computing, July-August 1997, 68–77.
  8. D. Firesmith, Engineering security requirements, Journal of Object Technology Vol. 2, No. 1, pp. 53-68, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Assurance Security requirements Threat model