2010
DOI: 10.1007/s10776-010-0116-y
|View full text |Cite
|
Sign up to set email alerts
|

A Security Architecture for Reconfigurable Networked Embedded Systems

Abstract: Nowadays, networked embedded systems (NESs) are required to be reconfigurable in order to be customizable to different operating environments and/or adaptable to changes in operating environment. However, reconfigurability acts against security as it introduces new sources of vulnerability. In this paper, we propose a security architecture that integrates, enriches and extends a compo- nent-based middleware layer with abstractions and mecha- nisms for secure reconfiguration and secure communication. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…The aspect of reconfigurability and its repercussions on security are considered from a higher‐level perspective in . A security architecture is proposed, which, based on a middleware layer, offers secure reconfiguration and communication (i.e.…”
Section: Middleware and Overlay Technologiesmentioning
confidence: 99%
“…The aspect of reconfigurability and its repercussions on security are considered from a higher‐level perspective in . A security architecture is proposed, which, based on a middleware layer, offers secure reconfiguration and communication (i.e.…”
Section: Middleware and Overlay Technologiesmentioning
confidence: 99%
“…Many solutions have been devised for WSNs security, including (Karlof, C., Sastry, N., and Wagner, D., 2004) for secure communication, (Wong, C.K., Gouda, M., and Lam, S.S., 2000;Su, Z., Lin, C., Ren, F., Jiang, Y., and Chu, X., 2009;Gu, W., Dutta, N., Chellappan, S., and Xiaole, B., 2011;Maerien, J., Michiels, S., Huygens, C., and Joosen, W., 2010;Dini, G., and Tiloca, M., 2010) for key management, and (Hyun, S., Ning, P., Liu, A., and Du, W., 2008;Lanigan, P.E., and Gandhi, R., and Narasimhan, P., 2006) for secure code dissemination. Particular attention has been paid to component-based security architectures tailored to WSNs (Matthys, N., Huygens, C., Hughes, D., Michiels, S., and Joosen, W., 2012;Dini, G., and Savino, I.M., 2010).…”
Section: Introductionmentioning
confidence: 99%
“…The aspect of reconfigurability and its repercussions on security are considered from a higherlevel perspective in [330]. A security architecture is proposed which, based on a middleware layer, offers secure reconfiguration and communication (i.e.…”
Section: Reconfigurable and Fault-tolerant Middlewarementioning
confidence: 99%