next up previous
Next: Data Authentication Up: Requirements for Sensor Network Previous: Requirements for Sensor Network

Full paper: Postscript, PS.GZ, PDF


Data Confidentiality

A sensor network should not leak sensor readings to neighboring networks. In many applications (e.g.key distribution) nodes communicate highly sensitive data. The standard approach for keeping sensitive data secret is to encrypt the data with a secret key that only intended receivers possess, hence achieving confidentiality. Given the observed communication patterns, we set up secure channels between nodes and base stations and later bootstrap other secure channels as necessary.


next up previous
Next: Data Authentication Up: Requirements for Sensor Network Previous: Requirements for Sensor Network

Adrian Perrig
Fri Jun 1 22:51:44 PDT 2001