Loading…
Pseudonymous communications in secure industrial wireless sensor networks
Wireless sensor networks are becoming widely deployed in the industry. They are used to provide contextual information about the industrial environment being surveyed, to control and monitor the industrial processes, and even for workers who can be augmented with sensors. In these wireless networks,...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Wireless sensor networks are becoming widely deployed in the industry. They are used to provide contextual information about the industrial environment being surveyed, to control and monitor the industrial processes, and even for workers who can be augmented with sensors. In these wireless networks, an adversary can easily eavesdrop communications with the aim to collect private information about sensors, because of the open nature of the wireless medium. A usual solution to prevent privacy violation relies on the use of pseudonyms as sensor identities; however, pseudonyms may deter authentication and access control enforcement in the network. This paper introduces an efficient pseudonym-based scheme that provides privacy protection to sensors without compromising network access security. |
---|---|
DOI: | 10.1109/PST.2013.6596042 |