Con dentiality In Sensor Networks: Transactional Information
نویسندگان
چکیده
In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Collectively, we refer to these elements as transactional data. Where the con dentiality of the content of the networks communications has been secured through encryption and authentication techniques, the ability of network outsiders and insiders to observe elements or the totality of this transactional data can also compromise network con dentiality. This paper describes four types of transactional data typically observable in sensor networks and discusses the information that can be derived through its observation and analysis. The paper argues that measures to limit the availability and utility of transactional data are essential to preserving con dentiality in sensor networks.
منابع مشابه
A Modal Logical Framework for Security Policies
It turns out that security becomes more and more important in many information systems. In this paper, we are more speci cally interested in con dentiality requirement. In this context, we show how knowledge representation techniques based on formal logic can be used to propose a faithful model of con dentiality. Our approach is to develop a modal logical framework which combines doxastic and d...
متن کاملOn Some Research Issues in Multilevel Database Security
Integrity and con dentiality have traditionally been treated as distinct objectives. In the arena of MLS Operating Systems this dichotomy has not been a problem. The integrity demands placed on an OS do not signi cantly con ict with multilevel con dentiality. However, for MLS DBMS's the situation is quite di erent. Integrity and con dentiality are often in direct con ict, as one seeks to retain...
متن کاملWhen the Clouds Disperse Data Con dentiality and Privacy in Cloud Computing
Cloud computing has emerged as a main form of modern computing due to its many advantages. But there are also some disadvantages if users decide to store sensitive data in the cloud. This seminar paper deals with cloud computing security issues and threats, especially with data con dentiality and privacy issues. The interests of di erent groups on users private data, the legal aspects which ena...
متن کاملSecurity Models
Even if we limit ourselves to models of con dentiality, there are two related, but distinct, senses of the term security model in the computer security literature [McL90b]. In the more limited use of the term, a security model speci es a particular mechanism for enforcing con dentiality, called access control, which was brought over into computer security from the world of documents and safes. ...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کامل