Attack detection vs. privacy - How to find the link or how to hide it?

4Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless sensor networks often have to be protected not only against an active attacker who tries to disrupt a network operation, but also against a passive attacker who tries to get sensitive information about the location of a certain node or about the movement of a tracked object. To address such issues, we can use an intrusion detection system and a privacy mechanism simultaneously. However, both of these often come with contradictory aims. A privacy mechanism typically tries to hide a relation between various events while an intrusion detection system tries to link the events up. This paper explores some of the problems that might occur when these techniques are brought together and we also provide some ideas how these problems could be solved. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Kůr, J., Matyáš, V., Stetsko, A., & Švenda, P. (2011). Attack detection vs. privacy - How to find the link or how to hide it? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7114 LNCS, pp. 189–199). https://doi.org/10.1007/978-3-642-25867-1_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free