All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

A protocol for intrusion detection in location privacy-aware wireless sensor networks

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F14%3A00073816" target="_blank" >RIV/00216224:14330/14:00073816 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1007/978-3-319-09770-1_16" target="_blank" >http://dx.doi.org/10.1007/978-3-319-09770-1_16</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-3-319-09770-1_16" target="_blank" >10.1007/978-3-319-09770-1_16</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    A protocol for intrusion detection in location privacy-aware wireless sensor networks

  • Original language description

    Wireless sensor networks come with some very challenging demands for security -- they often call for protection against active attackers trying to disrupt a network operation, but also against passive attackers looking for (potentially) sensitive information about the location of a certain node or about the movement of a tracked object. Selective forwarding is a basic yet powerful active attack. It can be detected using several existing techniques if enough information is available to an intrusion detection system. Yet when the system lacks the information due to a location privacy measure, selective forwarding detection becomes complicated. In this paper, we propose a method for detecting selective forwarding attacks and packet modification attacks concurrently with supporting location privacy. The resulting system counters a global eavesdropper capable of some active actions, such as dropping and modification of packets.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/GAP202%2F11%2F0422" target="_blank" >GAP202/11/0422: Privacy preserving security protocols and intrusion detection for wireless sensor networks</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2014

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Trust, Privacy, and Security in Digital Business, 11th International Conference, TrustBus 2014

  • ISBN

    9783319097695

  • ISSN

    0302-9743

  • e-ISSN

  • Number of pages

    11

  • Pages from-to

    180-190

  • Publisher name

    Springer

  • Place of publication

    Heidelberg

  • Event location

    Munich

  • Event date

    Jan 1, 2014

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article