Attack Detection vs. Privacy – How to Find the Link or How to Hide It?
- Jiří KůrAffiliated withMasaryk University
- , Vashek MatyášAffiliated withMasaryk University
- , Andriy StetskoAffiliated withMasaryk University
- , Petr ŠvendaAffiliated withMasaryk University
Wireless sensor networks often have to be protected not only against an active attacker who tries to disrupt a network operation, but also against a passive attacker who tries to get sensitive information about the location of a certain node or about the movement of a tracked object. To address such issues, we can use an intrusion detection system and a privacy mechanism simultaneously. However, both of these often come with contradictory aims. A privacy mechanism typically tries to hide a relation between various events while an intrusion detection system tries to link the events up. This paper explores some of the problems that might occur when these techniques are brought together and we also provide some ideas how these problems could be solved.
- Attack Detection vs. Privacy – How to Find the Link or How to Hide It?
- Book Title
- Security Protocols XIX
- Book Subtitle
- 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers
- pp 189-199
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Industry Sectors
- eBook Packages
- Editor Affiliations
- 16. School of Computer Science, University of Hertfordshire
- 17. Faculty of Mathematical, Physical and Natural Sciences, University of Trento
- 18. Computer Laboratory, University of Cambridge
- Author Affiliations
- 19. Masaryk University, Brno, Czech Republic
To view the rest of this content please follow the download PDF link above.