Loading…
Transactional Confidentiality in Sensor Networks
In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data - that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects...
Saved in:
Published in: | IEEE security & privacy 2008-07, Vol.6 (4), p.28-35 |
---|---|
Main Authors: | , , , , , , |
Format: | Magazinearticle |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43 |
---|---|
cites | cdi_FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43 |
container_end_page | 35 |
container_issue | 4 |
container_start_page | 28 |
container_title | IEEE security & privacy |
container_volume | 6 |
creator | Pai, Sameer Meingast, Marci Roosta, Tanya Bermudez, Sergio Wicker, Stephen B. Mulligan, Deirdre K. Sastry, Shankar |
description | In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data - that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Whereas the confidentiality of network communications content is secured through encryption and authentication techniques, the ability of network outsiders and insiders to observe transactional data can also compromise network confidentiality. Four types of transactional data are typically observable in sensor networks. Measures to limit the availability and utility of transactional data are essential to preserving confidentiality in sensor networks. |
doi_str_mv | 10.1109/MSP.2008.107 |
format | magazinearticle |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_MSP_2008_107</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4588227</ieee_id><sourcerecordid>2545298811</sourcerecordid><originalsourceid>FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43</originalsourceid><addsrcrecordid>eNpd0MtLAzEQBvAgCtbqzZuX4smDWzN5bLJHKb6gPqD1HJJ0FlK3G022SP97d6l48DTD8OOD-Qg5BzoFoNXN8-JtyijVU6DqgIxASl0IKsrDYRe0UFXFj8lJzmtKGYDUI0KXybbZ-i7E1jaTWWzrsMK2C7YJ3W4S2skC2xzT5AW775g-8ik5qm2T8ex3jsn7_d1y9ljMXx-eZrfzwnOQXeG4rKVAywU47lwtNKVgraDKa_TonFI1ihK1Boa1cCXj1lcCAErtVl7wMbna536m-LXF3JlNyB6bxrYYt9lAqYCpSgrV08t_dB23qX8nmwoYp4LKqkfXe-RTzDlhbT5T2Ni0M0DN0J7p2zNDe_1hyLzY84CIf1RIrRlT_AeIOGnu</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>912304059</pqid></control><display><type>magazinearticle</type><title>Transactional Confidentiality in Sensor Networks</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Pai, Sameer ; Meingast, Marci ; Roosta, Tanya ; Bermudez, Sergio ; Wicker, Stephen B. ; Mulligan, Deirdre K. ; Sastry, Shankar</creator><creatorcontrib>Pai, Sameer ; Meingast, Marci ; Roosta, Tanya ; Bermudez, Sergio ; Wicker, Stephen B. ; Mulligan, Deirdre K. ; Sastry, Shankar</creatorcontrib><description>In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data - that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Whereas the confidentiality of network communications content is secured through encryption and authentication techniques, the ability of network outsiders and insiders to observe transactional data can also compromise network confidentiality. Four types of transactional data are typically observable in sensor networks. Measures to limit the availability and utility of transactional data are essential to preserving confidentiality in sensor networks.</description><identifier>ISSN: 1540-7993</identifier><identifier>EISSN: 1558-4046</identifier><identifier>DOI: 10.1109/MSP.2008.107</identifier><identifier>CODEN: ISPMCN</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authentication ; Availability ; Computer information security ; computer systems organization ; Computers and society ; Data privacy ; Data security ; Information analysis ; Information security ; IP networks ; Messages ; networking and information technology ; Networks ; operating systems ; Patient monitoring ; Protection ; public policy issues ; Routing ; Routing (telecommunications) ; security and privacy protection ; sensor networks ; Sensors ; Telecommunication traffic ; Utilities ; wide-area networks</subject><ispartof>IEEE security & privacy, 2008-07, Vol.6 (4), p.28-35</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43</citedby><cites>FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4588227$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>776,780,27902,54771</link.rule.ids></links><search><creatorcontrib>Pai, Sameer</creatorcontrib><creatorcontrib>Meingast, Marci</creatorcontrib><creatorcontrib>Roosta, Tanya</creatorcontrib><creatorcontrib>Bermudez, Sergio</creatorcontrib><creatorcontrib>Wicker, Stephen B.</creatorcontrib><creatorcontrib>Mulligan, Deirdre K.</creatorcontrib><creatorcontrib>Sastry, Shankar</creatorcontrib><title>Transactional Confidentiality in Sensor Networks</title><title>IEEE security & privacy</title><addtitle>SECP-M</addtitle><description>In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data - that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Whereas the confidentiality of network communications content is secured through encryption and authentication techniques, the ability of network outsiders and insiders to observe transactional data can also compromise network confidentiality. Four types of transactional data are typically observable in sensor networks. Measures to limit the availability and utility of transactional data are essential to preserving confidentiality in sensor networks.</description><subject>Authentication</subject><subject>Availability</subject><subject>Computer information security</subject><subject>computer systems organization</subject><subject>Computers and society</subject><subject>Data privacy</subject><subject>Data security</subject><subject>Information analysis</subject><subject>Information security</subject><subject>IP networks</subject><subject>Messages</subject><subject>networking and information technology</subject><subject>Networks</subject><subject>operating systems</subject><subject>Patient monitoring</subject><subject>Protection</subject><subject>public policy issues</subject><subject>Routing</subject><subject>Routing (telecommunications)</subject><subject>security and privacy protection</subject><subject>sensor networks</subject><subject>Sensors</subject><subject>Telecommunication traffic</subject><subject>Utilities</subject><subject>wide-area networks</subject><issn>1540-7993</issn><issn>1558-4046</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2008</creationdate><recordtype>magazinearticle</recordtype><recordid>eNpd0MtLAzEQBvAgCtbqzZuX4smDWzN5bLJHKb6gPqD1HJJ0FlK3G022SP97d6l48DTD8OOD-Qg5BzoFoNXN8-JtyijVU6DqgIxASl0IKsrDYRe0UFXFj8lJzmtKGYDUI0KXybbZ-i7E1jaTWWzrsMK2C7YJ3W4S2skC2xzT5AW775g-8ik5qm2T8ex3jsn7_d1y9ljMXx-eZrfzwnOQXeG4rKVAywU47lwtNKVgraDKa_TonFI1ihK1Boa1cCXj1lcCAErtVl7wMbna536m-LXF3JlNyB6bxrYYt9lAqYCpSgrV08t_dB23qX8nmwoYp4LKqkfXe-RTzDlhbT5T2Ni0M0DN0J7p2zNDe_1hyLzY84CIf1RIrRlT_AeIOGnu</recordid><startdate>20080701</startdate><enddate>20080701</enddate><creator>Pai, Sameer</creator><creator>Meingast, Marci</creator><creator>Roosta, Tanya</creator><creator>Bermudez, Sergio</creator><creator>Wicker, Stephen B.</creator><creator>Mulligan, Deirdre K.</creator><creator>Sastry, Shankar</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20080701</creationdate><title>Transactional Confidentiality in Sensor Networks</title><author>Pai, Sameer ; Meingast, Marci ; Roosta, Tanya ; Bermudez, Sergio ; Wicker, Stephen B. ; Mulligan, Deirdre K. ; Sastry, Shankar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Authentication</topic><topic>Availability</topic><topic>Computer information security</topic><topic>computer systems organization</topic><topic>Computers and society</topic><topic>Data privacy</topic><topic>Data security</topic><topic>Information analysis</topic><topic>Information security</topic><topic>IP networks</topic><topic>Messages</topic><topic>networking and information technology</topic><topic>Networks</topic><topic>operating systems</topic><topic>Patient monitoring</topic><topic>Protection</topic><topic>public policy issues</topic><topic>Routing</topic><topic>Routing (telecommunications)</topic><topic>security and privacy protection</topic><topic>sensor networks</topic><topic>Sensors</topic><topic>Telecommunication traffic</topic><topic>Utilities</topic><topic>wide-area networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Pai, Sameer</creatorcontrib><creatorcontrib>Meingast, Marci</creatorcontrib><creatorcontrib>Roosta, Tanya</creatorcontrib><creatorcontrib>Bermudez, Sergio</creatorcontrib><creatorcontrib>Wicker, Stephen B.</creatorcontrib><creatorcontrib>Mulligan, Deirdre K.</creatorcontrib><creatorcontrib>Sastry, Shankar</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics & Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE security & privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Pai, Sameer</au><au>Meingast, Marci</au><au>Roosta, Tanya</au><au>Bermudez, Sergio</au><au>Wicker, Stephen B.</au><au>Mulligan, Deirdre K.</au><au>Sastry, Shankar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Transactional Confidentiality in Sensor Networks</atitle><jtitle>IEEE security & privacy</jtitle><stitle>SECP-M</stitle><date>2008-07-01</date><risdate>2008</risdate><volume>6</volume><issue>4</issue><spage>28</spage><epage>35</epage><pages>28-35</pages><issn>1540-7993</issn><eissn>1558-4046</eissn><coden>ISPMCN</coden><abstract>In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data - that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploying the network, and location of subjects and objects moving through the networked space. Whereas the confidentiality of network communications content is secured through encryption and authentication techniques, the ability of network outsiders and insiders to observe transactional data can also compromise network confidentiality. Four types of transactional data are typically observable in sensor networks. Measures to limit the availability and utility of transactional data are essential to preserving confidentiality in sensor networks.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MSP.2008.107</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1540-7993 |
ispartof | IEEE security & privacy, 2008-07, Vol.6 (4), p.28-35 |
issn | 1540-7993 1558-4046 |
language | eng |
recordid | cdi_crossref_primary_10_1109_MSP_2008_107 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Authentication Availability Computer information security computer systems organization Computers and society Data privacy Data security Information analysis Information security IP networks Messages networking and information technology Networks operating systems Patient monitoring Protection public policy issues Routing Routing (telecommunications) security and privacy protection sensor networks Sensors Telecommunication traffic Utilities wide-area networks |
title | Transactional Confidentiality in Sensor Networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T18%3A20%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Transactional%20Confidentiality%20in%20Sensor%20Networks&rft.jtitle=IEEE%20security%20&%20privacy&rft.au=Pai,%20Sameer&rft.date=2008-07-01&rft.volume=6&rft.issue=4&rft.spage=28&rft.epage=35&rft.pages=28-35&rft.issn=1540-7993&rft.eissn=1558-4046&rft.coden=ISPMCN&rft_id=info:doi/10.1109/MSP.2008.107&rft_dat=%3Cproquest_cross%3E2545298811%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c315t-b35f54ea341b3bbf48001aa407c8ecebb77fe46e8812ef4b623ac9411168bdc43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=912304059&rft_id=info:pmid/&rft_ieee_id=4588227&rfr_iscdi=true |