This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Transactional Confidentiality in Sensor Networks
July/August 2008 (vol. 6 no. 4)
pp. 28-35
Sameer Pai, Cornell University
Marci Meingast, University of California, Berkeley
Tanya Roosta, University of California, Berkeley
Sergio Bermudez, Cornell University
Stephen B. Wicker, Cornell University
Deirdre K. Mulligan, University of California, Berkeley
Shankar Sastry, University of California, Berkeley
In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data—that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Whereas the confidentiality of network communications content is secured through encryption and authentication techniques, the ability of network outsiders and insiders to observe transactional data can also compromise network confidentiality. Four types of transactional data are typically observable in sensor networks. Measures to limit the availability and utility of transactional data are essential to preserving confidentiality in sensor networks.

1. D. Liu, C.-H. Chi, and M. Li, "Normalizing Traffic Pattern with Anonymity for Mission Critical Applications," Proc. 37th Ann. Simulation Symp., IEEE CS Press, 2004, p. 293.
2. D.K. Mulligan, "Reasonable Expectations in Electronic Communications: A Critical Perspective on the Electronic Communications Privacy Act," George Washington Law Rev., vol. 72, 2004, p. 1557.
3. O.S. Kerr, "A User's Guide to the Stored Communications Act—and a Legislator's Guide to Amending It," George Washington Law Rev., vol. 72, 2004, p. 1208.
4. C.C. Tiu, "A New Frequency-based Side Channel Attack for Embedded Systems," MS thesis, Dept. of Electrical and Computer Eng., Univ. of Waterloo, 2005.
5. J. Hightower and G. Borriella, "Location Systems for Ubiquitous Computing," Computer, vol. 34, no. 8, 2001, pp. 57–66.
6. T. He et al., "Aida: Adaptive Application-independent Data Aggregation in Wireless Sensor Networks," ACM Trans. Embedded Computing System, vol. 3, no. 2, 2004, pp. 426–457.
7. J. Deng, R. Han, and S. Mishra, "Countermeasures against Traffic Analysis Attacks in Wireless Sensor Networks," Proc. 1st Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SECURECOMM), IEEE CS Press, 2005, pp. 113–126.
8. P. Thomson et al., "Real-time Health Monitoring of Civil Infrastructure Systems in Colombia," Health Monitoring and Management of Civil Infrastructure Systems, Proc. SPIE, vol. 4337, 2001, pp. 113–121.
9. A. Wood et al., "Alarm-Net: Wireless Sensor Networks for Assisted-Living and Residential Monitoring," tech. report CS-2006-11, Dept. of Computer Science, Univ. of Virginia, 2006.
10. A. Mainwaring et al., "Wireless Sensor Networks for Habitat Monitoring," Proc. 1st ACM Int'l Workshop Wireless Sensor Networks and Applications (WSNA), ACM Press, 2002, pp. 88–97.
11. R. Szewczyk et al., "Habitat Monitoring with Sensor Networks," Comm. ACM, vol. 47, no. 6, 2004, pp. 34–40.
1. A. Perrig et al., "Spins: Security Protocol for Sensor Networks," Wireless Networks, 2002, pp. 521–534.
2. P. Kamat, Y. Zhang, and W. Trappe, "Enhancing Source-location Privacy in Sensor Network Routing," Proc. 25th IEEE Int'l Conf. Distributed Computing Systems, IEEE CS Press, 2005, pp. 599–608.
3. P. Kamat et al., "Temporal Privacy in Wireless Sensor Networks," Proc. 27th Int'l Conf. Distributed Computing Systems (ICDCS), IEEE CS Press, 2007, p. 23.
4. J. Deng, R. Han, and S. Mishra, "Countermeasures against Traffic Analysis Attacks in Wireless Sensor Networks," Proc. 1st Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SECURECOMM), IEEE CS Press, 2005, pp. 113–126.
5. A. Wadaa et al., "On Providing Anonymity in Wireless Sensor Networks," Proc. 10th Int'l Conf. Parallel and Distributed Systems (ICPADS), IEEE CS Press, 2004, p. 411.

Index Terms:
Computers and society, public policy issues, computer systems organization, networking and information technology, wide-area networks, sensor networks, operating systems, security and privacy protection
Citation:
Sameer Pai, Marci Meingast, Tanya Roosta, Sergio Bermudez, Stephen B. Wicker, Deirdre K. Mulligan, Shankar Sastry, "Transactional Confidentiality in Sensor Networks," IEEE Security & Privacy, vol. 6, no. 4, pp. 28-35, July-Aug. 2008, doi:10.1109/MSP.2008.107
Usage of this product signifies your acceptance of the Terms of Use.