• DocumentCode
    1890765
  • Title

    G-E-M sensor networks for mission critical surveillance in hostile environments

  • Author

    Czarlinska, A. ; Luh, W. ; Kundur, D.

  • Author_Institution
    Texas A&M Univ., College Station, TX
  • fYear
    2008
  • fDate
    13-18 April 2008
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    The gathering of surveillance data such as visual intelligence from potentially hostile areas has long played a pivotal role in attaining various safety and security objectives. The methodology of gathering such surveillance is increasingly shifting towards rapid-deployment autonomous networks that limit the need for human exposure, and that cover large unattended areas while operating over extended periods of time. To achieve the surveillance objectives, such networks must be dependable and secure even in the presence of a potentially hostile counter-surveillance opponent. In this work we explicitly model and consider the presence of such an opponent in the form of a hostile sensor network with eavesdropping and actuation capabilities. We present a methodology for addressing the security and dependability issues arising in such extreme settings, which we collectively refer to as G-E-M. Specifically, we wish to ensure the legitimacy and authenticity of the gathered (G-E-M) visual surveillance in the presence of a hostile network engaged in stealthy disinformation activities. We also wish to ensure that the collected surveillance can be encrypted (G-E-M) for transmission even if keys between the nodes and the sink are temporarily compromised or otherwise unavailable. Finally we wish to ensure that the network design both inherently prolongs the lifetime of the network and also mitigates (G-E-M) deliberate energy drains. These issues are not typically examined collectively though the dependability of all these components is required to maintain the functionality and longevity of the network. Though developed and presented for the case of an attacker in the form of a hostile network, the methodologies have applicability to networks with a subset of subverted nodes that behave maliciously.
  • Keywords
    cryptography; safety; video surveillance; wireless sensor networks; gather-encrypt-mitigate sensor network; hostile environments; mission critical surveillance; safety objectives; security objectives; visual intelligence; Computer networks; Computer security; Cryptography; Data engineering; Data security; Electrical safety; Humans; Intelligent networks; Mission critical systems; Surveillance;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    INFOCOM Workshops 2008, IEEE
  • Conference_Location
    Phoenix, AZ
  • Print_ISBN
    978-1-4244-2219-7
  • Type

    conf

  • DOI
    10.1109/INFOCOM.2008.4544592
  • Filename
    4544592