Loading…

Transactional Confidentiality in Sensor Networks

In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data - that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects...

Full description

Saved in:
Bibliographic Details
Published in:IEEE security & privacy 2008-07, Vol.6 (4), p.28-35
Main Authors: Pai, Sameer, Meingast, Marci, Roosta, Tanya, Bermudez, Sergio, Wicker, Stephen B., Mulligan, Deirdre K., Sastry, Shankar
Format: Magazinearticle
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43
cites cdi_FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43
container_end_page 35
container_issue 4
container_start_page 28
container_title IEEE security & privacy
container_volume 6
creator Pai, Sameer
Meingast, Marci
Roosta, Tanya
Bermudez, Sergio
Wicker, Stephen B.
Mulligan, Deirdre K.
Sastry, Shankar
description In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data - that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Whereas the confidentiality of network communications content is secured through encryption and authentication techniques, the ability of network outsiders and insiders to observe transactional data can also compromise network confidentiality. Four types of transactional data are typically observable in sensor networks. Measures to limit the availability and utility of transactional data are essential to preserving confidentiality in sensor networks.
doi_str_mv 10.1109/MSP.2008.107
format magazinearticle
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_MSP_2008_107</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4588227</ieee_id><sourcerecordid>2545298811</sourcerecordid><originalsourceid>FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43</originalsourceid><addsrcrecordid>eNpd0MtLAzEQBvAgCtbqzZuX4smDWzN5bLJHKb6gPqD1HJJ0FlK3G022SP97d6l48DTD8OOD-Qg5BzoFoNXN8-JtyijVU6DqgIxASl0IKsrDYRe0UFXFj8lJzmtKGYDUI0KXybbZ-i7E1jaTWWzrsMK2C7YJ3W4S2skC2xzT5AW775g-8ik5qm2T8ex3jsn7_d1y9ljMXx-eZrfzwnOQXeG4rKVAywU47lwtNKVgraDKa_TonFI1ihK1Boa1cCXj1lcCAErtVl7wMbna536m-LXF3JlNyB6bxrYYt9lAqYCpSgrV08t_dB23qX8nmwoYp4LKqkfXe-RTzDlhbT5T2Ni0M0DN0J7p2zNDe_1hyLzY84CIf1RIrRlT_AeIOGnu</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>912304059</pqid></control><display><type>magazinearticle</type><title>Transactional Confidentiality in Sensor Networks</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Pai, Sameer ; Meingast, Marci ; Roosta, Tanya ; Bermudez, Sergio ; Wicker, Stephen B. ; Mulligan, Deirdre K. ; Sastry, Shankar</creator><creatorcontrib>Pai, Sameer ; Meingast, Marci ; Roosta, Tanya ; Bermudez, Sergio ; Wicker, Stephen B. ; Mulligan, Deirdre K. ; Sastry, Shankar</creatorcontrib><description>In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data - that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Whereas the confidentiality of network communications content is secured through encryption and authentication techniques, the ability of network outsiders and insiders to observe transactional data can also compromise network confidentiality. Four types of transactional data are typically observable in sensor networks. Measures to limit the availability and utility of transactional data are essential to preserving confidentiality in sensor networks.</description><identifier>ISSN: 1540-7993</identifier><identifier>EISSN: 1558-4046</identifier><identifier>DOI: 10.1109/MSP.2008.107</identifier><identifier>CODEN: ISPMCN</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authentication ; Availability ; Computer information security ; computer systems organization ; Computers and society ; Data privacy ; Data security ; Information analysis ; Information security ; IP networks ; Messages ; networking and information technology ; Networks ; operating systems ; Patient monitoring ; Protection ; public policy issues ; Routing ; Routing (telecommunications) ; security and privacy protection ; sensor networks ; Sensors ; Telecommunication traffic ; Utilities ; wide-area networks</subject><ispartof>IEEE security &amp; privacy, 2008-07, Vol.6 (4), p.28-35</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43</citedby><cites>FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4588227$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>776,780,27902,54771</link.rule.ids></links><search><creatorcontrib>Pai, Sameer</creatorcontrib><creatorcontrib>Meingast, Marci</creatorcontrib><creatorcontrib>Roosta, Tanya</creatorcontrib><creatorcontrib>Bermudez, Sergio</creatorcontrib><creatorcontrib>Wicker, Stephen B.</creatorcontrib><creatorcontrib>Mulligan, Deirdre K.</creatorcontrib><creatorcontrib>Sastry, Shankar</creatorcontrib><title>Transactional Confidentiality in Sensor Networks</title><title>IEEE security &amp; privacy</title><addtitle>SECP-M</addtitle><description>In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data - that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Whereas the confidentiality of network communications content is secured through encryption and authentication techniques, the ability of network outsiders and insiders to observe transactional data can also compromise network confidentiality. Four types of transactional data are typically observable in sensor networks. Measures to limit the availability and utility of transactional data are essential to preserving confidentiality in sensor networks.</description><subject>Authentication</subject><subject>Availability</subject><subject>Computer information security</subject><subject>computer systems organization</subject><subject>Computers and society</subject><subject>Data privacy</subject><subject>Data security</subject><subject>Information analysis</subject><subject>Information security</subject><subject>IP networks</subject><subject>Messages</subject><subject>networking and information technology</subject><subject>Networks</subject><subject>operating systems</subject><subject>Patient monitoring</subject><subject>Protection</subject><subject>public policy issues</subject><subject>Routing</subject><subject>Routing (telecommunications)</subject><subject>security and privacy protection</subject><subject>sensor networks</subject><subject>Sensors</subject><subject>Telecommunication traffic</subject><subject>Utilities</subject><subject>wide-area networks</subject><issn>1540-7993</issn><issn>1558-4046</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2008</creationdate><recordtype>magazinearticle</recordtype><recordid>eNpd0MtLAzEQBvAgCtbqzZuX4smDWzN5bLJHKb6gPqD1HJJ0FlK3G022SP97d6l48DTD8OOD-Qg5BzoFoNXN8-JtyijVU6DqgIxASl0IKsrDYRe0UFXFj8lJzmtKGYDUI0KXybbZ-i7E1jaTWWzrsMK2C7YJ3W4S2skC2xzT5AW775g-8ik5qm2T8ex3jsn7_d1y9ljMXx-eZrfzwnOQXeG4rKVAywU47lwtNKVgraDKa_TonFI1ihK1Boa1cCXj1lcCAErtVl7wMbna536m-LXF3JlNyB6bxrYYt9lAqYCpSgrV08t_dB23qX8nmwoYp4LKqkfXe-RTzDlhbT5T2Ni0M0DN0J7p2zNDe_1hyLzY84CIf1RIrRlT_AeIOGnu</recordid><startdate>20080701</startdate><enddate>20080701</enddate><creator>Pai, Sameer</creator><creator>Meingast, Marci</creator><creator>Roosta, Tanya</creator><creator>Bermudez, Sergio</creator><creator>Wicker, Stephen B.</creator><creator>Mulligan, Deirdre K.</creator><creator>Sastry, Shankar</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20080701</creationdate><title>Transactional Confidentiality in Sensor Networks</title><author>Pai, Sameer ; Meingast, Marci ; Roosta, Tanya ; Bermudez, Sergio ; Wicker, Stephen B. ; Mulligan, Deirdre K. ; Sastry, Shankar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Authentication</topic><topic>Availability</topic><topic>Computer information security</topic><topic>computer systems organization</topic><topic>Computers and society</topic><topic>Data privacy</topic><topic>Data security</topic><topic>Information analysis</topic><topic>Information security</topic><topic>IP networks</topic><topic>Messages</topic><topic>networking and information technology</topic><topic>Networks</topic><topic>operating systems</topic><topic>Patient monitoring</topic><topic>Protection</topic><topic>public policy issues</topic><topic>Routing</topic><topic>Routing (telecommunications)</topic><topic>security and privacy protection</topic><topic>sensor networks</topic><topic>Sensors</topic><topic>Telecommunication traffic</topic><topic>Utilities</topic><topic>wide-area networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Pai, Sameer</creatorcontrib><creatorcontrib>Meingast, Marci</creatorcontrib><creatorcontrib>Roosta, Tanya</creatorcontrib><creatorcontrib>Bermudez, Sergio</creatorcontrib><creatorcontrib>Wicker, Stephen B.</creatorcontrib><creatorcontrib>Mulligan, Deirdre K.</creatorcontrib><creatorcontrib>Sastry, Shankar</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE security &amp; privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Pai, Sameer</au><au>Meingast, Marci</au><au>Roosta, Tanya</au><au>Bermudez, Sergio</au><au>Wicker, Stephen B.</au><au>Mulligan, Deirdre K.</au><au>Sastry, Shankar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Transactional Confidentiality in Sensor Networks</atitle><jtitle>IEEE security &amp; privacy</jtitle><stitle>SECP-M</stitle><date>2008-07-01</date><risdate>2008</risdate><volume>6</volume><issue>4</issue><spage>28</spage><epage>35</epage><pages>28-35</pages><issn>1540-7993</issn><eissn>1558-4046</eissn><coden>ISPMCN</coden><abstract>In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data - that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Whereas the confidentiality of network communications content is secured through encryption and authentication techniques, the ability of network outsiders and insiders to observe transactional data can also compromise network confidentiality. Four types of transactional data are typically observable in sensor networks. Measures to limit the availability and utility of transactional data are essential to preserving confidentiality in sensor networks.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MSP.2008.107</doi><tpages>8</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1540-7993
ispartof IEEE security & privacy, 2008-07, Vol.6 (4), p.28-35
issn 1540-7993
1558-4046
language eng
recordid cdi_crossref_primary_10_1109_MSP_2008_107
source IEEE Electronic Library (IEL) Journals
subjects Authentication
Availability
Computer information security
computer systems organization
Computers and society
Data privacy
Data security
Information analysis
Information security
IP networks
Messages
networking and information technology
Networks
operating systems
Patient monitoring
Protection
public policy issues
Routing
Routing (telecommunications)
security and privacy protection
sensor networks
Sensors
Telecommunication traffic
Utilities
wide-area networks
title Transactional Confidentiality in Sensor Networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T18%3A20%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Transactional%20Confidentiality%20in%20Sensor%20Networks&rft.jtitle=IEEE%20security%20&%20privacy&rft.au=Pai,%20Sameer&rft.date=2008-07-01&rft.volume=6&rft.issue=4&rft.spage=28&rft.epage=35&rft.pages=28-35&rft.issn=1540-7993&rft.eissn=1558-4046&rft.coden=ISPMCN&rft_id=info:doi/10.1109/MSP.2008.107&rft_dat=%3Cproquest_cross%3E2545298811%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=912304059&rft_id=info:pmid/&rft_ieee_id=4588227&rfr_iscdi=true