The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (2008 vol. 6)
ISSN: 1540-7993
pp: 28-35
Deirdre K. Mulligan , University of California, Berkeley
Shankar Sastry , University of California, Berkeley
Sergio Bermudez , Cornell University
Tanya Roosta , University of California, Berkeley
Sameer Pai , Cornell University
Marci Meingast , University of California, Berkeley
Stephen B. Wicker , Cornell University
ABSTRACT
In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data—that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Whereas the confidentiality of network communications content is secured through encryption and authentication techniques, the ability of network outsiders and insiders to observe transactional data can also compromise network confidentiality. Four types of transactional data are typically observable in sensor networks. Measures to limit the availability and utility of transactional data are essential to preserving confidentiality in sensor networks.
INDEX TERMS
Computers and society, public policy issues, computer systems organization, networking and information technology, wide-area networks, sensor networks, operating systems, security and privacy protection
CITATION
Deirdre K. Mulligan, Shankar Sastry, Sergio Bermudez, Tanya Roosta, Sameer Pai, Marci Meingast, Stephen B. Wicker, "Transactional Confidentiality in Sensor Networks", IEEE Security & Privacy, vol. 6, no. , pp. 28-35, July/August 2008, doi:10.1109/MSP.2008.107
108 ms
(Ver )