Abstract
With the emergence of small devices equipped with wireless communication, several sophisticated systems for search and rescue have been proposed and developed. However, a key obstacle in large deployment of these systems is vulnerability to users’ security and privacy. On one hand, search and rescue systems need to collect as much information about a user’s location and movement as possible to locate that user in a timely manner. On the other hand, this very capability can be misused by adversaries to stalk a person, which in turn drives users away from using such a system. This paper describes the design, implementation and performance of a security and privacy framework for SenSearch, which is a sensor-based search and rescue system for people in emergency situation in wilderness areas. This framework has been carefully built by employing a combination of symmetric and asymmetric key cryptography to meet the constraints of resource-limited devices and short time intervals during which most security operations have to be performed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
802.11-based tracking system, http://www.pangonetworks.com/locator.htm
Personal locator beacons with GPS receiver and satellite transmitter, http://www.aeromedix.com/
Personal tracking using GPS and GSM system, http://www.ulocate.com/trimtrac.html
Rf based kid tracking system, http://www.ion-kids.com/
Jaskowski, W., Jedrzejek, K., Nyczkowski, B., Skowronek, S.: Lifetch life saving system. In: CSIDC (2004)
Huang, J.-H., Amjad, S., Mishra, S.: CenWits: A Sensor-Based Loosely Coupled Search and Rescue System Using Witnesses. In: SenSys 2005 (2005)
Open source big number operation and RSA library, http://www.dimgt.com.au/bigdigits.html
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.: Comparing elliptic curve cryptography and RSA on 8-bit CPU. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)
Huang, J., Jiang, L., Kamthe, A., Freeman, I., Ledbetter, J., Mishra, S., Han, R., Cerpa, A.: SenSearch: GPS and witness assisted tracking system for delay tolerant sensor networks. TR 1045-08, Computer Science, CU-Boulder (2008)
Liu, A., Ning, P.: TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN 2008 (2008)
Luo, X., Zheng, K., Pan, Y., Wu, Z.: Encryption algorithm comparison for wireless sensor networks. In: Proceedings of the International Conference on Systems, Man and Cybernetics (2004)
Vitaletti, A., Palombizio, G.: Rijndael for sensor networks:Is speed the main issue. In: WCNC 2006 (2006)
Wang, H., Li, Q.: Efficient implementations of public key cryptosystems on mote sensors. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 519–528. Springer, Heidelberg (2006)
Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: Securing sensor networks with public key cryptography. In: SASN 2004 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Huang, JH., Black, J., Mishra, S. (2010). Security and Privacy in a Sensor-Based Search and Rescue System. In: Zheng, J., Mao, S., Midkiff, S.F., Zhu, H. (eds) Ad Hoc Networks. ADHOCNETS 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 28. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11723-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-11723-7_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11722-0
Online ISBN: 978-3-642-11723-7
eBook Packages: Computer ScienceComputer Science (R0)