CFP last date
21 October 2024
Reseach Article

Understanding Total System Assurance: the Case of Mobile Agent-based Wireless Sensor Network Systems

Published on March 2012 by Kassem Saleh, Anwar Al-Yatama, Nidal Nasser
Wireless Information Networks & Business Information System (WINBIS 2012)
Foundation of Computer Science USA
WINBIS2012 - Number 1
March 2012
Authors: Kassem Saleh, Anwar Al-Yatama, Nidal Nasser
1fca720e-91a6-4093-af9e-4f27d1d8366f

Kassem Saleh, Anwar Al-Yatama, Nidal Nasser . Understanding Total System Assurance: the Case of Mobile Agent-based Wireless Sensor Network Systems. Wireless Information Networks & Business Information System (WINBIS 2012). WINBIS2012, 1 (March 2012), 5-10.

@article{
author = { Kassem Saleh, Anwar Al-Yatama, Nidal Nasser },
title = { Understanding Total System Assurance: the Case of Mobile Agent-based Wireless Sensor Network Systems },
journal = { Wireless Information Networks & Business Information System (WINBIS 2012) },
issue_date = { March 2012 },
volume = { WINBIS2012 },
number = { 1 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 5-10 },
numpages = 6,
url = { /proceedings/winbis2012/number1/5488-1002/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Wireless Information Networks & Business Information System (WINBIS 2012)
%A Kassem Saleh
%A Anwar Al-Yatama
%A Nidal Nasser
%T Understanding Total System Assurance: the Case of Mobile Agent-based Wireless Sensor Network Systems
%J Wireless Information Networks & Business Information System (WINBIS 2012)
%@ 0975-8887
%V WINBIS2012
%N 1
%P 5-10
%D 2012
%I International Journal of Computer Applications
Abstract

Total System Assurance (TSA) deals with assuring the security of all system components by considering all potential risks. This comprehensive approach to system assurance tackles security from multiple points of views, thus ensuring the highest possible level of assurance. In this paper we illustrate the TSA approach by considering a complex system running a mobile agent-based wireless sensor network (MA-WSN). Security in WSNs has been addressed extensively in the literature, however a comprehensive and integrative system security and assurance has not been considered. Total assurance in MA-WSN applications relies on the security of the mobile agents, and the mobile agent platform, in addition to the security of the wireless sensors and the application servers. Total assurance is tackled in a generic and comprehensive manner by considering a mixture of three approaches to addressing security concerns in systems. These approaches are based on the elicitation of security requirements, the misuse case-based threat model, and the prevention-detection-response model.

References
  1. C. Pfleeger and S. Pfleeger, Security in Computing, Prentice Hall, 4th edition, 2006.
  2. J.P. Walters et al., Wireless sensor networks security: A Survey, Chapter 17, Security in Distributed, Grid and Prevasive Computing, CRC Press, 2006.
  3. W. Cockayne, and M. Zyda, (1998), Mobile Agents, Manning, Pearson Education, Harlow.
  4. Kiniry, J. and Zimmerman, D. (1997), ``A hands-on look at Java mobile agents’’, IEEE Internet Computing, July, pp. 21-30.
  5. D. Lange and M. Oshima, Programming and Deploying Java Mobile Agents with Aglets, Addison-Wesley, 1998.
  6. M. Chen, et al., “Applications and design issues for mobile agents in wireless networks”, IEEE Wireless Communications, December 2007, pp. 20-26.
  7. G. Karjoth et al., ‘A security model for Aglets’, IEEE Internet Computing, July-August 1997, 68–77.
  8. D. Firesmith, Engineering security requirements, Journal of Object Technology Vol. 2, No. 1, pp. 53-68, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

assurance security requirements threat model