Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Understanding Total System Assurance: the Case of Mobile Agent-based Wireless Sensor Network Systems

Print
PDF
Wireless Information Networks & Business Information System
© 2011 by IJCA Journal
Number 1 - Article 7
Year of Publication: 2011
Authors:
Kassem Saleh

Kassem Saleh. Understanding Total System Assurance: the Case of Mobile Agent-based Wireless Sensor Network Systems. IJCA Special Issue on Wireless Information Networks & Business Information System (1):26–32, 2011. Full text available. BibTeX

@article{key:article,
	author = {Kassem Saleh},
	title = {Understanding Total System Assurance: the Case of Mobile Agent-based Wireless Sensor Network Systems},
	journal = {IJCA Special Issue on Wireless Information Networks & Business Information System},
	year = {2011},
	number = {1},
	pages = {26--32},
	note = {Full text available}
}

Abstract

Total System Assurance (TSA) deals with assuring the security of all system components by considering all potential risks. This comprehensive approach to system assurance tackles security from multiple points of views, thus ensuring the highest possible level of assurance. In this paper we illustrate the TSA approach by considering a complex system running a mobile agent-based wireless sensor network (MA-WSN). Security in WSNs has been addressed extensively in the literature, however a comprehensive and integrative system security and assurance has not been considered. Total assurance in MA-WSN applications relies on the security of the mobile agents, and the mobile agent platform, in addition to the security of the wireless sensors and the application servers. Total assurance is tackled in a generic and comprehensive manner by considering a mixture of three approaches to addressing security concerns in systems. These approaches are based on the elicitation of security requirements, the misuse case-based threat model, and the prevention-detection-response model.

Reference

  • C. Pfleeger and S. Pfleeger, Security in Computing, Prentice Hall, 4th edition, 2006.
  • J.P. Walters et al., Wireless sensor networks security: A Survey, Chapter 17, Security in Distributed, Grid and Prevasive Computing, CRC Press, 2006.
  • W. Cockayne, and M. Zyda, (1998), Mobile Agents, Manning, Pearson Education, Harlow.
  • Kiniry, J. and Zimmerman, D. (1997), ``A hands-on look at Java mobile agents’’, IEEE Internet Computing, July, pp. 21-30.
  • D. Lange and M. Oshima, Programming and Deploying Java Mobile Agents with Aglets, Addison-Wesley, 1998.
  • M. Chen, et al., “Applications and design issues for mobile agents in wireless networks”, IEEE Wireless Communications, December 2007, pp. 20-26.
  • G. Karjoth et al., ‘A security model for Aglets’, IEEE Internet Computing, July-August 1997, 68–77.
  • D. Firesmith, Engineering security requirements, Journal of Object Technology Vol. 2, No. 1, pp. 53-68, 2003.