A cross-layer security scheme of web-services-based communications for IEEE 1451 sensor and actuator networks

Jun Wu, Ming Zhan, Bin Duan, Jiang Liu

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

IEEE 1451 standard has been proposed to provide a common communication interface and transducer electric data sheet format for wired and wireless distributed applications in smart transducers (sensors and actuators). Currently, a unified Web service for IEEE 1451 smart transducers is a must. However, ensuring the security of web-services-based communications for IEEE 1451 smart transducers is an unsolved problem. In this paper, we proposed a cross-layer security mechanism that deals with the requirements of authentication, integrity, confidentiality, and availability across the communication process in IEEE 1451 smart transducers. The scheme contains three cross-layer components logically, including XML Encryption and Signature, SOAP Security Extension, and Web Services Description Language (WSDL) Security Checking. The former two components satisfy the requirements of confidentiality, availability, integrity, authentication, nonrepudiation, and freshness. The third component satisfies the requirement of availability, which can protect the system against denial-of-service (DoS) attack. The three cross-layer security components are integrated seamlessly in our scheme. To evaluate the overhead, we perform tests to evaluate the effect of message size on the performance of the access inquiry web service. The result supports the usefulness and feasibility of our scheme.

Original languageEnglish
Article number138384
JournalInternational Journal of Distributed Sensor Networks
Volume2013
DOIs
Publication statusPublished - 2013 Apr 3
Externally publishedYes

ASJC Scopus subject areas

  • Engineering(all)
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'A cross-layer security scheme of web-services-based communications for IEEE 1451 sensor and actuator networks'. Together they form a unique fingerprint.

Cite this