Detailed Information on Publication Record
2011
Attack Detection vs. Privacy - How to Find the Link or How to Hide it?
KŮR, Jiří, Václav MATYÁŠ, Andriy STETSKO and Petr ŠVENDABasic information
Original name
Attack Detection vs. Privacy - How to Find the Link or How to Hide it?
Authors
KŮR, Jiří (203 Czech Republic, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, belonging to the institution), Andriy STETSKO (804 Ukraine, guarantor, belonging to the institution) and Petr ŠVENDA (203 Czech Republic, belonging to the institution)
Edition
Neuveden, Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 2011, Revised Selected Papers, p. 189-199, 11 pp. 2011
Publisher
Springer Heidelberg Dordrecht London New York
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
United Kingdom of Great Britain and Northern Ireland
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
printed version "print"
RIV identification code
RIV/00216224:14330/11:00050343
Organization unit
Faculty of Informatics
ISBN
978-3-642-25866-4
UT WoS
000307041200018
Keywords in English
intrusion detection; privacy mechanism; wireless sensor network
Tags
Tags
International impact, Reviewed
Změněno: 10/4/2013 15:09, RNDr. Jiří Kůr, Ph.D.
Abstract
V originále
Wireless sensor networks often have to be protected not only against an active attacker who tries to disrupt a network operation, but also against a passive attacker who tries to get sensitive information about the location of a certain node or about the movement of a tracked object. To address such issues, we can use an intrusion detection system and a privacy mechanism simultaneously. However, both of these often come with contradictory aims. A privacy mechanism typically tries to hide a relation between various events while an intrusion detection system tries to link the events up. This paper explores some of the problems that might occur when these techniques are brought together and we also provide some ideas how these problems could be solved.
Links
GAP202/11/0422, research and development project |
| ||
GD102/09/H042, research and development project |
|