SECURITY AND DEPENDABILITY IN AMBIENT INTELLIGENCE SCENARIOS - The Communication Prototype

Alvaro Armenteros, Antonio Muñoz, Antonio Maña, Daniel Serrano

Abstract

Ambient Intelligence (AmI) refers to an environment that is sensitive, responsive, interconnected, contextualized, transparent, intelligent, and acting on behalf of humans. Security, privacy, and trust challenges are amplified with AmI computing model and need to be handled. Along this paper the potential of SERENITY in Ambient Intelligence (AmI) Ecosystems is described. Main objective of SERENITY consists on providing a framework for the automated treatment of security and dependability issues in AmI scenarios. Besides, a proof of concept is provided. In this paper, we describe the implementation of a prototype based on the application of the SERENITY model (including processes, artefacts and tools) to an industrial AmI scenario. A complete description of this prototype, along with all S&D artefacts used is provided in following sections.

References

  1. SERENITY project. Funded by European Commission. Directorate General Information Society & Media.Unit D4 - ICT for Trust and Security, under grant IST027587. http://www.SERENITY-project.org, 2006.
  2. Merabti M. Shi Q. Askwith B. Llewellyn-Jones, D. Utilising component composition for secure ubiquitous computing. In Proceedings of 2nd UKUbiNet Work-shop., 2004.
  3. Zhang Shi, Q. An effective model for composition of secure systems. 1998. Journal of Systems and Software, 433:233-44.
  4. Gilson Wilson and Ullas O. Tharakan. Unified security framework. In Trinity College Dublin, editor, In ISICT 7803: Proceedings of the 1st international symposium on Information and communication technologies, pages 500-505, 2003.
  5. Le Gruenwald Carlos Sanchez and Mauricio Sanchez. A monte carlo framework to evaluate context based security policies in pervasive mobile environments. In New York, USA, ACM, editor, In MobiDE 7807: Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access., pages 41-48. ACM, 2007.
  6. R. Sampemane G. Ranganathan A. Campbell R.H. Hill. A framework for automatically satisfying security requirements. In Workshop on pecification and Automated Processing of Security Requirements' - SAPS'04 at the 19th IEEE International Conference on Automated Software Engineering., 2004.
  7. C. Boudaoud, K.; McCathieNevile. An intelligent agentbased model for security management. In iscc, editor, Seventh International Symposium on computers and Communications, page 877, 2002.
  8. IBM's Security Strategy team, 2004. Introduction to Business Security Patterns. An IBM White Paper. Available at http://www3.ibm.com/security/patterns/intro.pdf. 2004.
  9. J. Yoder and J. Barcalow. Architectural patterns for enabling application security. In MA: AddisonWesley Publishing Company. Reading, editor, Pattern Languages of Program Design., volume 4, pages 301- 336, 2000.
  10. E.B. Fernandez. Metadata and authorization patterns. In Technical report, Florida Atlantic University, 2000.
  11. Romanosky, S., 2001. Security Design Patterns, Part 1, 1.4.
  12. E.B. Fernandez and Rouyi. Pan. A pattern language for security models. In PLoP01 Conference., 2001.
  13. Soundarajan N. Hallstrom, J. O. Pattern-based system evolution: A case-study. In the Proc of the 18th International Conference on Software Engineering and Knowledge Engineering. San Francisco Bay, USA., 2006.
  14. T. Mikkonen. Formalizing design patterns. In IEEE Computer Society Press.,editor, In Proc. Of 20th ICSE., pages 115-124, 1998.
  15. Richard W. Hamming. Coding and Information Theory. Prentice-Hall, 1980. ISBN 0-13-139139-9.
  16. Gideon Yuval. “How to Swindle Rabin”. Cryptologia, 3: 187189, Jul 1979. ISSN 0161-1194.
  17. A. Maña, C. Rudolph, G. Spanoudakis, V. Lotz, F. Massacci, M. Melideo, and J. M. López-Cobo. Security Engineering for Ambient Intelligence: A Manifesto. Integrating Security and Software Engineering. IDEA Group, 2006. ISBN 1-59904-148- 0.
  18. Daniel Serrano, Antonio Maña, and Athanasios-Dimitrios Sotirious. Towards precise and certified security patterns. In Proceedings of 2nd International Workshop on Secure systems methodologies using patterns, Spattern 2008, pages 287-291, Turin, Italy, September 2008. IEEE Computer Society. ISBN 978- 0-7695-3299-8.
  19. Aresdani Aboba B, Calhoun P, 2003 RADIUS Support For Extensible Authentication Protocol EAP. IETF RFC 3579 , updates: RFC 2869.
  20. Chiba M, Dommety G, Eklund M, Mitton D, Aboba B., 2008 Dynamic Authorization Extensions to Remote Authentication Dial In User Service. IETF RFC 5176. Obsoletes: RFC 3576.
Download


Paper Citation


in Harvard Style

Armenteros A., Muñoz A., Maña A. and Serrano D. (2009). SECURITY AND DEPENDABILITY IN AMBIENT INTELLIGENCE SCENARIOS - The Communication Prototype . In Proceedings of the 11th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8111-86-9, pages 49-56. DOI: 10.5220/0001949500490056


in Bibtex Style

@conference{iceis09,
author={Alvaro Armenteros and Antonio Muñoz and Antonio Maña and Daniel Serrano},
title={SECURITY AND DEPENDABILITY IN AMBIENT INTELLIGENCE SCENARIOS - The Communication Prototype},
booktitle={Proceedings of the 11th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2009},
pages={49-56},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001949500490056},
isbn={978-989-8111-86-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - SECURITY AND DEPENDABILITY IN AMBIENT INTELLIGENCE SCENARIOS - The Communication Prototype
SN - 978-989-8111-86-9
AU - Armenteros A.
AU - Muñoz A.
AU - Maña A.
AU - Serrano D.
PY - 2009
SP - 49
EP - 56
DO - 10.5220/0001949500490056