{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:22:50Z","timestamp":1760242970910,"version":"build-2065373602"},"reference-count":47,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2015,3,4]],"date-time":"2015-03-04T00:00:00Z","timestamp":1425427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs).We evaluate our approach using a case study from the intelligent transportation system domain.<\/jats:p>","DOI":"10.3390\/s150305251","type":"journal-article","created":{"date-parts":[[2015,3,4]],"date-time":"2015-03-04T10:19:49Z","timestamp":1425464389000},"page":"5251-5280","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks"],"prefix":"10.3390","volume":"15","author":[{"given":"M\u00f3nica","family":"Pinto","sequence":"first","affiliation":[{"name":"Departamento de Lenguajes y Ciencias de la Computaci\u00f3n, University of M\u00e1laga, Andaluc\u00eda Tech, M\u00e1laga 29071, Spain"}]},{"given":"Nadia","family":"G\u00e1mez","sequence":"additional","affiliation":[{"name":"Departamento de Lenguajes y Ciencias de la Computaci\u00f3n, University of M\u00e1laga, Andaluc\u00eda Tech, M\u00e1laga 29071, Spain"}]},{"given":"Lidia","family":"Fuentes","sequence":"additional","affiliation":[{"name":"Departamento de Lenguajes y Ciencias de la Computaci\u00f3n, University of M\u00e1laga, Andaluc\u00eda Tech, M\u00e1laga 29071, Spain"}]},{"given":"Mercedes","family":"Amor","sequence":"additional","affiliation":[{"name":"Departamento de Lenguajes y Ciencias de la Computaci\u00f3n, University of M\u00e1laga, Andaluc\u00eda Tech, M\u00e1laga 29071, Spain"}]},{"given":"Jos\u00e9","family":"Horcas","sequence":"additional","affiliation":[{"name":"Departamento de Lenguajes y Ciencias de la Computaci\u00f3n, University of M\u00e1laga, Andaluc\u00eda Tech, M\u00e1laga 29071, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5119-3469","authenticated-orcid":false,"given":"Inmaculada","family":"Ayala","sequence":"additional","affiliation":[{"name":"Departamento de Lenguajes y Ciencias de la Computaci\u00f3n, University of M\u00e1laga, Andaluc\u00eda Tech, M\u00e1laga 29071, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"key":"ref_1","first-page":"2","article-title":"Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks","volume":"2013","author":"Khan","year":"2013","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Shi, W., and Gong, P. (2013). A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. Int. J. Distrib. Sens. Netw., 2013.","DOI":"10.1155\/2013\/730831"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"4225","DOI":"10.3390\/s140304225","article-title":"RFID-Based Vehicle Positioning and Its Applications in Connected Vehicles","volume":"14","author":"Wang","year":"2014","journal-title":"Sensors"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"15863","DOI":"10.3390\/s131215863","article-title":"A Partially Distributed Intrusion Detection System for Wireless Sensor Networks","volume":"13","author":"Cho","year":"2013","journal-title":"Sensors"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3718","DOI":"10.3390\/s100403718","article-title":"Authentication and Key Establishment in Dynamic Wireless Sensor Networks","volume":"10","author":"Qiu","year":"2010","journal-title":"Sensors"},{"key":"ref_6","first-page":"93","article-title":"Dynamic Software Product Lines","volume":"41","author":"Hallsteinsen","year":"2008","journal-title":"Comput. J."},{"key":"ref_7","first-page":"22","article-title":"Building Dynamic Software Product Lines","volume":"45","author":"Hinchey","year":"2012","journal-title":"Comput. J."},{"key":"ref_8","unstructured":"INTER-TRUST European Project ICT-2011.1.4 Trustworthy ICT Contract n. 317731. Available online: http:\/\/www.inter-trust.eu."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s00779-010-0354-0","article-title":"FamiWare: A family of event-based middleware for ambient intelligence","volume":"15","author":"Fuentes","year":"2011","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_10","first-page":"266","article-title":"CVL: Common Variability Language","volume":"2","author":"Haugen","year":"2012","journal-title":"SPLC\u203212"},{"key":"ref_11","unstructured":"OMG, Object Management Group. Available online: http:\/\/www.omg.org."},{"key":"ref_12","unstructured":"OCL 2014, Object Constraint Language, 2.4, 2014. Available online: http:\/\/www.omg.org\/spec\/OCL\/2.4\/."},{"key":"ref_13","unstructured":"OMG 2008, Data Distribution Service for Real-Time Systems, v1.2., 2008. Available online: http:\/\/doi.ieeecomputersociety.org\/10.1109\/MS.2014.24."},{"key":"ref_14","unstructured":"Fayad, M.E., Schmidt, D.C., and Johnson, R.E. (1999). Building Application Frameworks: Object-Oriented Foundations of Framework Design, John Wiley & Sons, Inc."},{"key":"ref_15","unstructured":"Autrel, F., Cuppens, F., Cuppens-Boulahia, N., and Coma, C. (2008, January 13\u201317). MotOrBAC 2: a security policy tool. Loctudy, France."},{"key":"ref_16","unstructured":"ETSI: European Telecommunications Standards Institue (2010). ETSI TS 102 637-1 V1.1.1 (2010-09), Technical Specification."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","article-title":"A Survey of Intrusion Detection Systems in Wireless Sensor Networks","volume":"16","author":"Butun","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Lee, K., Kang, K.C., and Lee, J. (2002, January 15\u201319). Concepts and Guidelines of Feature Modeling for Product Line Software Engineering. Austin, TX, USA. ICSR-7.","DOI":"10.1007\/3-540-46020-9_5"},{"key":"ref_19","unstructured":"Toumi, K., Cavalli, A., Aouadi, M, Ayed, S., Cuppens, N., Cuppens, F., Idrees, S., Mallouli, W., Montes de Oca, E., and Fuentes, L. INTER-TRUST Approach and Framework Specification (First Version), 2013. Available online: http:\/\/www.inter-trust.eu."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/BFb0053381","article-title":"Aspect-Oriented Programming","volume":"Volume 1241","author":"Kiczales","year":"1997","journal-title":"ECOOP\u203297\u2014Object-Oriented Programming"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"G\u00e1mez, N. (2011). FamiWare: An Autonomic Middleware Family for Ambient Intelligence. [Ph.D. Thesis, University of M\u00e1laga, M\u00c3\u0105laga].","DOI":"10.1007\/s00779-010-0354-0"},{"key":"ref_22","unstructured":"OWL-S, Semantic Markup for Web Services. Available online: http:\/\/www.w3.org\/Submission\/OWL-S\/."},{"key":"ref_23","first-page":"22","article-title":"Models@ run.time","volume":"42","author":"Blair","year":"2009","journal-title":"Comput. J."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Liu, T., and Martonosi, M. (2003, January 11\u201313). Impala: A Middleware System for Managing Autonomic, Parallel Sensor Systems. San Diego, CA, USA.","DOI":"10.1145\/781498.781516"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MNET.2004.1265828","article-title":"Middleware to support sensor network applications","volume":"18","author":"Heinzelman","year":"2004","journal-title":"IEEE Netw."},{"key":"ref_26","unstructured":"(2005). IBM 2005, Autonomic Computing White Paper \u2014 An Architectural Blueprint for Autonomic Computing, 2005, IBM Corp."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"G\u00e1mez, N., Fuentes, L., and Arag\u00fcez, M.A. (2011, January 13\u201316). Autonomic Computing Driven by Feature Models and Architecture in FamiWare. Essen, Germany.","DOI":"10.1007\/978-3-642-23798-0_16"},{"key":"ref_28","unstructured":"Levis, P., Patel, N., Culler, D., and Shenker, S. (2004, January 29\u201331). Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. San Francisco, CA, USA."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-319-04897-0_2","article-title":"Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies","volume":"8364","author":"Elrakaiby","year":"2014","journal-title":"Eng. Secur. Softw. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1016\/S0952-1976(04)00118-6","article-title":"Dynamic security reconfiguration for the semantic web","volume":"17","author":"Tan","year":"2004","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1080\/08839510500484298","article-title":"A semantic approach to harmonizing security models for open services","volume":"20","author":"Tan","year":"2006","journal-title":"Appl. Artif. Intell."},{"key":"ref_32","unstructured":"Jrjens, J. (2010). Secure Systems Development with UML, Springer-Verlag."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/1125808.1125810","article-title":"Model Driven Security: From UML Models to Access Control Infrastructures. ACM Trans","volume":"15","author":"Basin","year":"2006","journal-title":"Softw. Eng. Methodol."},{"key":"ref_34","unstructured":"Lang, U. (December, January 30). OpenPMF SCaaS: Authorization as a Service for Cloud & SOA Applications. Indianapolis, IN, USA."},{"key":"ref_35","unstructured":"Lang, U. (2011). ISSE 2010 Securing Electronic Business Processes, Vieweg+Teubner Verlag."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-642-35887-6_9","article-title":"Enhancing Model Driven Security through Pattern Refinement Techniques","volume":"Volume 7542","author":"Beckert","year":"2013","journal-title":"Formal Methods for Components and Objects"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Morin, B., Mouelhi, T., Fleurey, F., Traon, Y.L., Barais, O., and J\u00e9z\u00e9quel, J.M. (2010, January 20\u201324). Security-Driven Model-Based Dynamic Adaptation, Antwerp, Belgium.","DOI":"10.1145\/1858996.1859040"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Dong, W. (2008, January 3\u20135). Dynamic Reconfiguration Method for Web Service Based on Policy. Guangzhou City, China.","DOI":"10.1109\/ISECS.2008.193"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1007\/978-3-642-25821-3_18","article-title":"Deploy Adjust Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement","volume":"Volume 7049","author":"Gheorghe","year":"2011","journal-title":"Middleware 2011"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1007\/978-3-642-32645-5_80","article-title":"Mobile Cloud Policy Decision Management for MDS","volume":"Volume 7425","author":"Cho","year":"2012","journal-title":"Convergence and Hybrid Information Technology"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"G\u00e1mez, N., and Fuentes, L. (2011, January 13\u201317). Software Product Line Evolution with Cardinality-Based Feature Models. Pohang, Korea.","DOI":"10.1007\/978-3-642-21347-2_9"},{"key":"ref_42","unstructured":"Bencomo, N., Sawyer, P., Blair, G., and Grace, P. (2008, January 8\u201312). Dynamically Adaptive Systems are Product Lines too: Using Model-Driven Techniques to Capture Dynamic Variability of Adaptive Systems. Limerick, Ireland."},{"key":"ref_43","unstructured":"Lee, J., and Kang, K. A. (2006, January 21\u201324). Feature-Oriented Approach to Developing Dynamically Reconfigurable Products in Product Line Engineering. Baltimore, MD, USA."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"G\u00e1mez, N., Fuentes, L., and Troya, J. (2014). Self-Adaptation of Mobile Systems with Dynamic Software Product Lines. IEEE Softw.","DOI":"10.1109\/MS.2014.24"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MC.2009.309","article-title":"Autonomic Computing through Reuse of Variability Models at Runtime: The Case of Smart Homes","volume":"42","author":"Cetina","year":"2009","journal-title":"IEEE Comput."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MC.2012.287","article-title":"Dynamic Variability in Software-Intensive Embedded System Families","volume":"45","author":"Bosch","year":"2012","journal-title":"IEEE Comput."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Jaroucheh, Z., Liu, X, and Smith, S. (2010, January 15\u201318). CANDEL: Product Line Baed Dynamic Context Management for Pervasive Applications. Krakow, Poland.","DOI":"10.1109\/CISIS.2010.21"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/15\/3\/5251\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:43:07Z","timestamp":1760215387000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/15\/3\/5251"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,4]]},"references-count":47,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,3]]}},"alternative-id":["s150305251"],"URL":"https:\/\/doi.org\/10.3390\/s150305251","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2015,3,4]]}}}