Secure Semantic Sensor Web and Pervasive Computing

In this paper we discuss issues on developing a secure semantic sensor web. SensorML is the starting point for this work. We explore the layers for a semantic sensor web and discuss security issues. We also discuss secure peer-to-peer computing as it relates to sensor web.

[1]  Bhavani M. Thuraisingham,et al.  Secure peer-to-peer networks for trusted collaboration , 2007, 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007).

[2]  Bijan Parsia,et al.  Task Computing - The Semantic Web Meets Pervasive Computing , 2003, SEMWEB.

[3]  Bhavani M. Thuraisingham,et al.  Centralized Security Labels in Decentralized P2P Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[4]  B. Thuraisingham,et al.  Secure sensor information management and mining , 2004, IEEE Signal Processing Magazine.

[5]  Ieee Staff 2009 Annual Computer Security Applications Conference , 2009 .

[6]  B. Thuraisingham Security and Privacy for Sensor Databases , 2003 .

[7]  Bhavani M. Thuraisingham Building Trustworthy Semantic Webs , 2009, IRI.

[8]  Tim Finin,et al.  A Security Architecture Based on Trust Management for Pervasive Computing Systems , 2002 .

[9]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[10]  Tim Moors,et al.  Survey of Research towards Robust Peer-to-Peer Networks: Search Methods , 2007, RFC.

[11]  Michael Stonebraker,et al.  Operator Scheduling in a Data Stream Manager , 2003, VLDB.

[12]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[13]  Astrid Lubinski,et al.  Security Issues in Mobile Database Access , 1998, DBSec.

[14]  Nabil Adam,et al.  Semantic Discovery and Composition of Web Services for RFID Applications in Border Control , 2004 .