Concealed Integrity Monitoring for Wireless Sensor Networks

Document Sample
Concealed Integrity Monitoring for Wireless Sensor Networks Powered By Docstoc
					Wireless Sensor Network, 2011, 3, 10-17
doi:10.4236/wsn.2011.31002 Published Online January 2011 (http://www.SciRP.org/journal/wsn)



               Concealed Integrity Monitoring for Wireless
                            Sensor Networks
                                           Björn Stelte, Thomas Bühring
            Institut für Technische Informatik, Universität der Bundeswehr München, Neubiberg, Germany
                                  E-mail: {bjoern.stelte, thomas.buehring}@unibw.de
                  Received Dec
				
DOCUMENT INFO
Description: Nowadays, sensor networks are widely installed around the world. Typical sensors provide data for healthcare, energy management, environmental monitoring, etc. In the future sensors will become a part of critical infrastructures. In such a scenario the network operator has to monitor the integrity of the network devices, otherwise the trustworthiness of the whole system is questionable. The problem is that every integrity protocol needs a secure channel between the devices. Therefore, we will introduce a covert channel for hidden transportation of integrity monitoring messages. The covert channel enables us to hide integrity check messages embedded into regular traffic without giving potential attackers a hint on the used integrity protocol. [PUBLICATION ABSTRACT]
BUY THIS DOCUMENT NOW PRICE: $6.95 100% MONEY BACK GUARANTEED
PARTNER ProQuest LLC
ProQuest creates specialized information resources and technologies that propel successful research, discovery, and lifelong learning.