The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (2008 vol. 6)
ISSN: 1540-7993
pp: 28-35
Sameer Pai , Cornell University
Marci Meingast , University of California, Berkeley
Tanya Roosta , University of California, Berkeley
Sergio Bermudez , Cornell University
Stephen B. Wicker , Cornell University
Deirdre K. Mulligan , University of California, Berkeley
Shankar Sastry , University of California, Berkeley
In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data—that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Whereas the confidentiality of network communications content is secured through encryption and authentication techniques, the ability of network outsiders and insiders to observe transactional data can also compromise network confidentiality. Four types of transactional data are typically observable in sensor networks. Measures to limit the availability and utility of transactional data are essential to preserving confidentiality in sensor networks.
Computers and society, public policy issues, computer systems organization, networking and information technology, wide-area networks, sensor networks, operating systems, security and privacy protection

D. K. Mulligan et al., "Transactional Confidentiality in Sensor Networks," in IEEE Security & Privacy, vol. 6, no. , pp. 28-35, 2008.
89 ms
(Ver 3.3 (11022016))