Skip to main content

Security and Privacy in a Sensor-Based Search and Rescue System

  • Conference paper
Ad Hoc Networks (ADHOCNETS 2009)

Abstract

With the emergence of small devices equipped with wireless communication, several sophisticated systems for search and rescue have been proposed and developed. However, a key obstacle in large deployment of these systems is vulnerability to users’ security and privacy. On one hand, search and rescue systems need to collect as much information about a user’s location and movement as possible to locate that user in a timely manner. On the other hand, this very capability can be misused by adversaries to stalk a person, which in turn drives users away from using such a system. This paper describes the design, implementation and performance of a security and privacy framework for SenSearch, which is a sensor-based search and rescue system for people in emergency situation in wilderness areas. This framework has been carefully built by employing a combination of symmetric and asymmetric key cryptography to meet the constraints of resource-limited devices and short time intervals during which most security operations have to be performed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 802.11-based tracking system, http://www.pangonetworks.com/locator.htm

  2. Personal locator beacons with GPS receiver and satellite transmitter, http://www.aeromedix.com/

  3. Personal tracking using GPS and GSM system, http://www.ulocate.com/trimtrac.html

  4. Rf based kid tracking system, http://www.ion-kids.com/

  5. Jaskowski, W., Jedrzejek, K., Nyczkowski, B., Skowronek, S.: Lifetch life saving system. In: CSIDC (2004)

    Google Scholar 

  6. Huang, J.-H., Amjad, S., Mishra, S.: CenWits: A Sensor-Based Loosely Coupled Search and Rescue System Using Witnesses. In: SenSys 2005 (2005)

    Google Scholar 

  7. Open source big number operation and RSA library, http://www.dimgt.com.au/bigdigits.html

  8. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.: Comparing elliptic curve cryptography and RSA on 8-bit CPU. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Huang, J., Jiang, L., Kamthe, A., Freeman, I., Ledbetter, J., Mishra, S., Han, R., Cerpa, A.: SenSearch: GPS and witness assisted tracking system for delay tolerant sensor networks. TR 1045-08, Computer Science, CU-Boulder (2008)

    Google Scholar 

  10. Liu, A., Ning, P.: TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN 2008 (2008)

    Google Scholar 

  11. Luo, X., Zheng, K., Pan, Y., Wu, Z.: Encryption algorithm comparison for wireless sensor networks. In: Proceedings of the International Conference on Systems, Man and Cybernetics (2004)

    Google Scholar 

  12. Vitaletti, A., Palombizio, G.: Rijndael for sensor networks:Is speed the main issue. In: WCNC 2006 (2006)

    Google Scholar 

  13. Wang, H., Li, Q.: Efficient implementations of public key cryptosystems on mote sensors. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 519–528. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: Securing sensor networks with public key cryptography. In: SASN 2004 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Huang, JH., Black, J., Mishra, S. (2010). Security and Privacy in a Sensor-Based Search and Rescue System. In: Zheng, J., Mao, S., Midkiff, S.F., Zhu, H. (eds) Ad Hoc Networks. ADHOCNETS 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 28. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11723-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11723-7_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11722-0

  • Online ISBN: 978-3-642-11723-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics