Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
SpartanRPC: remote procedure call authorization in wireless sensor networks
Chapin P., Skalka C. ACM Transactions on Information and System Security17 (2):1-30,2014.Type:Article
Date Reviewed: Feb 17 2015

Communications in mobile reconnaissance mission systems require secure wireless sensor networks (WSNs). How should efficient and secure remote procedure calls (RPCs) be designed and implemented to allow servers to stipulate access policy and oblige clients to validate their identities? Chapin and Skalka present SpartanRPC, a secure middleware technology with an application programming interface (API) for controlling access to resources in WSNs. SpartanRPC permits network administrators to specify security policies for reconciling access to resources by network nodes with different security domains.

SpartanRPC, an extension of the nesC programming language, is used to specify interfaces for duties, authorizations, remote services, dynamic wires, and RPCs. A resource is a user-defined functionality for accomplishing a task. Interfaces that look like commands are duties used to specify remote services for dynamically communicating among neighboring nodes in WSNs. Remote types are inherent arithmetic types in nesC. A remote interface delivers duties with remote argument types. Remote component nodes have unique identifiers and manager interfaces that serve as the dynamic wiring endpoints. Dynamic wiring among components of a nesC program allows the specification of control flow from duty invocation to its implementation. A Diffie-Hellman security protocol is used in the system to authenticate access to resources by clients. Elliptic curve cryptography (ECC) signatures are initially applied to validate the SpartanRPC certificates of network communicating entities.

The authors concisely present a security policy language predicated on a distributed trust management system, and an authorization model that reflects interactions between servers and clients. The implementation of a secure directed diffusion with multihop data collection in SpartanRPC is discussed, to illuminate the support of the link-layer RPC service for network-layer communication. Client-server message communication programs and an environmental monitoring system were used to assess the performance of the system. The current system implementation is susceptible to denial of service (DoS) attacks and hardware intrusion. The memory and processing time attributed to the implementation of the security protocols is excessive. Nonetheless, SpartanRPC is reliable for many everyday WSN applications such as mobile medical emergency communication systems.

Reviewer:  Amos Olagunju Review #: CR143191 (1505-0409)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Compilers (D.3.4 ... )
 
 
Client/ Server (C.2.4 ... )
 
 
Real-Time And Embedded Systems (C.3 ... )
 
 
Run-Time Environments (D.3.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Compilers": Date
An architecture for combinator graph reduction
Philip John J., Academic Press Prof., Inc., San Diego, CA, 1990. Type: Book (9780124192409)
Feb 1 1992
Crafting a compiler with C
Fischer C., Richard J. J., Benjamin-Cummings Publ. Co., Inc., Redwood City, CA, 1991. Type: Book (9780805321661)
Feb 1 1992
A methodology and notation for compiler front end design
Brown C., Paul W. J. Software--Practice & Experience 14(4): 335-346, 1984. Type: Article
Jun 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy