KŮR, Jiří, Václav MATYÁŠ, Andriy STETSKO a Petr ŠVENDA. Attack Detection vs. Privacy - How to Find the Link or How to Hide it? In B. Christianson et al. Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 2011, Revised Selected Papers. Neuveden: Springer Heidelberg Dordrecht London New York, 2011, s. 189-199. ISBN 978-3-642-25866-4. Dostupné z: https://dx.doi.org/10.1007/978-3-642-25867-1_18. |
Další formáty:
BibTeX
LaTeX
RIS
@inproceedings{964898, author = {Kůr, Jiří and Matyáš, Václav and Stetsko, Andriy and Švenda, Petr}, address = {Neuveden}, booktitle = {Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 2011, Revised Selected Papers}, doi = {http://dx.doi.org/10.1007/978-3-642-25867-1_18}, editor = {B. Christianson et al.}, keywords = {intrusion detection; privacy mechanism; wireless sensor network}, howpublished = {tištěná verze "print"}, language = {eng}, location = {Neuveden}, isbn = {978-3-642-25866-4}, pages = {189-199}, publisher = {Springer Heidelberg Dordrecht London New York}, title = {Attack Detection vs. Privacy - How to Find the Link or How to Hide it?}, year = {2011} }
TY - JOUR ID - 964898 AU - Kůr, Jiří - Matyáš, Václav - Stetsko, Andriy - Švenda, Petr PY - 2011 TI - Attack Detection vs. Privacy - How to Find the Link or How to Hide it? PB - Springer Heidelberg Dordrecht London New York CY - Neuveden SN - 9783642258664 KW - intrusion detection KW - privacy mechanism KW - wireless sensor network N2 - Wireless sensor networks often have to be protected not only against an active attacker who tries to disrupt a network operation, but also against a passive attacker who tries to get sensitive information about the location of a certain node or about the movement of a tracked object. To address such issues, we can use an intrusion detection system and a privacy mechanism simultaneously. However, both of these often come with contradictory aims. A privacy mechanism typically tries to hide a relation between various events while an intrusion detection system tries to link the events up. This paper explores some of the problems that might occur when these techniques are brought together and we also provide some ideas how these problems could be solved. ER -
KŮR, Jiří, Václav MATYÁŠ, Andriy STETSKO a Petr ŠVENDA. Attack Detection vs. Privacy - How to Find the Link or How to Hide it? In B. Christianson et al. \textit{Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 2011, Revised Selected Papers}. Neuveden: Springer Heidelberg Dordrecht London New York, 2011, s.~189-199. ISBN~978-3-642-25866-4. Dostupné z: https://dx.doi.org/10.1007/978-3-642-25867-1\_{}18.
|