While many protocols for sensor network security
provide confidentiality for the content of messages, contextual information
usually remains exposed. Such contextual information can be exploited by an
adversary to derive sensitive information such as the locations of monitored
objects and data sinks in the field. Attacks on these components can
significantly undermine any network application. Existing techniques defend the
leakage of location information from a limited adversary who can only observe network
traffic in a small region. However, a stronger adversary, the global
eavesdropper, is realistic and can defeat these existing techniques..............Download
No comments:
Post a Comment