Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-xtgtn Total loading time: 0 Render date: 2024-04-24T00:25:52.849Z Has data issue: false hasContentIssue false

14 - Network data integrity

Published online by Cambridge University Press:  10 August 2009

Gregory J. Pottie
Affiliation:
University of California, Los Angeles
William J. Kaiser
Affiliation:
University of California, Los Angeles
Get access

Summary

The goal of a sensor network is to answer particular questions about the physical world for the users authorized to pose such questions. Implicit in this statement are a number of factors that are common to the security of networks and others that are particularly important in sensor networks:

  • secrecy – denial of access to information to unauthorized users;

  • authenticity – validation of the source of messages;

  • integrity – messages are not modified accidentally or maliciously;

  • anonymity – information retrieved minimally reveals the identity of groups or individuals not the subject of a query;

  • flexibility – a broad set of queries can be posed and this set can grow in time;

  • scalability – the network can scale to large numbers of nodes and users;

  • robustness – the network can resist resource-draining attacks.

The first three factors are conventionally dealt with in a security framework involving encryption, whereby private messages can be exchanged between one or more parties. However, in a sensor network context there is also the question of reliability of the information received since a malfunctioning source can potentially corrupt a great deal of information. Additionally, nodes placed in the open may have less physical security than is typical with computers, increasing the possibility of secret keys used in encryption being revealed. Dealing with this is closely connected with the question of calibration of sensors and trust relationships between different entities.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2005

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Network data integrity
  • Gregory J. Pottie, University of California, Los Angeles, William J. Kaiser, University of California, Los Angeles
  • Book: Principles of Embedded Networked Systems Design
  • Online publication: 10 August 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511541049.015
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Network data integrity
  • Gregory J. Pottie, University of California, Los Angeles, William J. Kaiser, University of California, Los Angeles
  • Book: Principles of Embedded Networked Systems Design
  • Online publication: 10 August 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511541049.015
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Network data integrity
  • Gregory J. Pottie, University of California, Los Angeles, William J. Kaiser, University of California, Los Angeles
  • Book: Principles of Embedded Networked Systems Design
  • Online publication: 10 August 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511541049.015
Available formats
×