Paper
1 September 2004 Special encryption considerations for unattended ground sensor systems
Author Affiliations +
Abstract
Requirements in Unattended Ground Sensor (UGS) systems have grown to include data privacy, message authentication, and anti-spoofing measures. This presents a challenge to the systems architect to consider approaches that defend against known and unknown attacks designed to compromise the system integrity. Encryption has been the preferred method to address these requirements. Encryption may be used to increase our confidence in the data transmitted in sensor networks, but requires greater, not less, attention to system security. After all, in an unencrypted network, at least we “know” that an adversary can read our data.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Allen P. Drummond "Special encryption considerations for unattended ground sensor systems", Proc. SPIE 5417, Unattended/Unmanned Ground, Ocean, and Air Sensor Technologies and Applications VI, (1 September 2004); https://doi.org/10.1117/12.542451
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Sensors

Transceivers

Error control coding

Unattended ground sensors

Network security

Algorithm development

RELATED CONTENT

A MAC layer analysis of an impersonation attack in a...
Proceedings of SPIE (June 13 2023)
Lightweight hardware monitoring of IoT devices
Proceedings of SPIE (May 03 2018)
Wireless sensor networks
Proceedings of SPIE (October 24 2006)
Hybrid architecture for building secure sensor networks
Proceedings of SPIE (April 04 2012)
Energy-efficient networked sensor transceivers
Proceedings of SPIE (September 18 2003)

Back to Top