KŮR, Jiří, Václav MATYÁŠ, Andriy STETSKO and Petr ŠVENDA. Attack Detection vs. Privacy - How to Find the Link or How to Hide it? In B. Christianson et al. Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 2011, Revised Selected Papers. Neuveden: Springer Heidelberg Dordrecht London New York, 2011, p. 189-199. ISBN 978-3-642-25866-4. Available from: https://dx.doi.org/10.1007/978-3-642-25867-1_18.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Attack Detection vs. Privacy - How to Find the Link or How to Hide it?
Authors KŮR, Jiří (203 Czech Republic, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, belonging to the institution), Andriy STETSKO (804 Ukraine, guarantor, belonging to the institution) and Petr ŠVENDA (203 Czech Republic, belonging to the institution).
Edition Neuveden, Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 2011, Revised Selected Papers, p. 189-199, 11 pp. 2011.
Publisher Springer Heidelberg Dordrecht London New York
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher United Kingdom of Great Britain and Northern Ireland
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
RIV identification code RIV/00216224:14330/11:00050343
Organization unit Faculty of Informatics
ISBN 978-3-642-25866-4
Doi http://dx.doi.org/10.1007/978-3-642-25867-1_18
UT WoS 000307041200018
Keywords in English intrusion detection; privacy mechanism; wireless sensor network
Tags best
Tags International impact, Reviewed
Changed by Changed by: RNDr. Jiří Kůr, Ph.D., učo 98692. Changed: 10/4/2013 15:09.
Abstract
Wireless sensor networks often have to be protected not only against an active attacker who tries to disrupt a network operation, but also against a passive attacker who tries to get sensitive information about the location of a certain node or about the movement of a tracked object. To address such issues, we can use an intrusion detection system and a privacy mechanism simultaneously. However, both of these often come with contradictory aims. A privacy mechanism typically tries to hide a relation between various events while an intrusion detection system tries to link the events up. This paper explores some of the problems that might occur when these techniques are brought together and we also provide some ideas how these problems could be solved.
Links
GAP202/11/0422, research and development projectName: Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích (Acronym: P202/11/0422)
Investor: Czech Science Foundation
GD102/09/H042, research and development projectName: Matematické a inženýrské metody pro vývoj spolehlivých a bezpečných paralelních a distribuovaných počítačových systémů
Investor: Czech Science Foundation
PrintDisplayed: 22/6/2024 10:02