International Workshop on Security Protocols

Security Protocols 2011: Security Protocols XIX pp 189-199

Attack Detection vs. Privacy – How to Find the Link or How to Hide It?

  • Jiří Kůr
  • Vashek Matyáš
  • Andriy Stetsko
  • Petr Švenda
Conference paper

DOI: 10.1007/978-3-642-25867-1_18

Volume 7114 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Kůr J., Matyáš V., Stetsko A., Švenda P. (2011) Attack Detection vs. Privacy – How to Find the Link or How to Hide It?. In: Christianson B., Crispo B., Malcolm J., Stajano F. (eds) Security Protocols XIX. Security Protocols 2011. Lecture Notes in Computer Science, vol 7114. Springer, Berlin, Heidelberg

Abstract

Wireless sensor networks often have to be protected not only against an active attacker who tries to disrupt a network operation, but also against a passive attacker who tries to get sensitive information about the location of a certain node or about the movement of a tracked object. To address such issues, we can use an intrusion detection system and a privacy mechanism simultaneously. However, both of these often come with contradictory aims. A privacy mechanism typically tries to hide a relation between various events while an intrusion detection system tries to link the events up. This paper explores some of the problems that might occur when these techniques are brought together and we also provide some ideas how these problems could be solved.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Jiří Kůr
    • 1
  • Vashek Matyáš
    • 1
  • Andriy Stetsko
    • 1
  • Petr Švenda
    • 1
  1. 1.Masaryk UniversityBrnoCzech Republic