Access Restriction

Author Di, Roberto ♦ Luigi, Pietro ♦ Mancini, V. ♦ Soriente, Claudio ♦ Spognardi, Angelo ♦ Tsudik, Gene
Source CiteSeerX
Content type Text
File Format PDF
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Data Survival ♦ Unattended Sensor Network ♦ Safe External Entity ♦ High-value Target ♦ Hostile Environment ♦ Several Attack ♦ Real Time Sensitive Data ♦ Adversary Intent ♦ High Value ♦ Sensor Network ♦ Unattended Sensor Inability ♦ Certain Target Data ♦ Focused Attack
Abstract Unattended sensor networks operating in hostile environments might collect data that represents a high-value target for the adversary. The unattended sensor’s inability to off-load – in real time – sensitive data to a safe external entity makes it easy for the adversary to mount a focused attack aimed at eliminating certain target data. In order to facilitate survival of this data, sensors can collectively attempt to confuse the adversary by changing its location and content, i.e., by periodically moving the data around the network and encrypting it. In this paper, we focus on data survival in unattended sensor networks faced with an adversary intent on surgically destroying data which it considers to be of high value. After motivating the problem and considering several attack
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Publisher Institution Università Di Roma Tre