D 2011

Attack Detection vs. Privacy - How to Find the Link or How to Hide it?

KŮR, Jiří, Václav MATYÁŠ, Andriy STETSKO and Petr ŠVENDA

Basic information

Original name

Attack Detection vs. Privacy - How to Find the Link or How to Hide it?

Authors

KŮR, Jiří (203 Czech Republic, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, belonging to the institution), Andriy STETSKO (804 Ukraine, guarantor, belonging to the institution) and Petr ŠVENDA (203 Czech Republic, belonging to the institution)

Edition

Neuveden, Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 2011, Revised Selected Papers, p. 189-199, 11 pp. 2011

Publisher

Springer Heidelberg Dordrecht London New York

Other information

Language

English

Type of outcome

Stať ve sborníku

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

United Kingdom of Great Britain and Northern Ireland

Confidentiality degree

není předmětem státního či obchodního tajemství

Publication form

printed version "print"

RIV identification code

RIV/00216224:14330/11:00050343

Organization unit

Faculty of Informatics

ISBN

978-3-642-25866-4

UT WoS

000307041200018

Keywords in English

intrusion detection; privacy mechanism; wireless sensor network

Tags

Tags

International impact, Reviewed
Změněno: 10/4/2013 15:09, RNDr. Jiří Kůr, Ph.D.

Abstract

V originále

Wireless sensor networks often have to be protected not only against an active attacker who tries to disrupt a network operation, but also against a passive attacker who tries to get sensitive information about the location of a certain node or about the movement of a tracked object. To address such issues, we can use an intrusion detection system and a privacy mechanism simultaneously. However, both of these often come with contradictory aims. A privacy mechanism typically tries to hide a relation between various events while an intrusion detection system tries to link the events up. This paper explores some of the problems that might occur when these techniques are brought together and we also provide some ideas how these problems could be solved.

Links

GAP202/11/0422, research and development project
Name: Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích (Acronym: P202/11/0422)
Investor: Czech Science Foundation
GD102/09/H042, research and development project
Name: Matematické a inženýrské metody pro vývoj spolehlivých a bezpečných paralelních a distribuovaných počítačových systémů
Investor: Czech Science Foundation