[IEEE 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) - Seattle, WA, USA (2011.03.21-2011.03.25)] 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) - Keynote: Information Assurance in sensor networks

Download [IEEE 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) - Seattle, WA, USA (2011.03.21-2011.03.25)] 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) - Keynote: Information Assurance in sensor networks

Post on 10-Feb-2017

214 views

Category:

Documents

2 download

TRANSCRIPT

Keynote: Information Assurance in Sensor Networks Prof Zygmunt Haas, NSF & Cornell University Information Assurance (IA) grew out of the field of computer network security. However, IA is a much broader term than network security and relates to the managing of the risks associated with the use, processing, storage, and transmission of information. The most basic model of IA relies on three properties: confidentiality, integrity, and availability, thus it is often referred to as the CIA model. The wide consensus is that the commonly assumed attributes of sensor nodes, such as low energy, low computational power, unattended operation, and wireless connectivity are considered challenges in implementing IA in sensor networks. Similarly, the broad range of applications, which results in broad range of possibly heterogeneous information modalities, makes the problem even more complex. Though, the relatively constant membership of sensor networks is usually perceived as an advantage. Similarly, the typical massive deployment of nodes can be exploited in the design of IA protocols. In this talk, I will describe an extension of the CIA model and its application to sensor networks. In particular, I will discuss a number of approaches to support IA in sensor networks. The Third International Workshop on Information Quality and Quality of Service for Pervasive Computing1

Recommended

View more >