Ad Hoc Networks. First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers

Research Article

Security and Privacy in a Sensor-Based Search and Rescue System

Download296 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-11723-7_12,
        author={Jyh-How Huang and John Black and Shivakant Mishra},
        title={Security and Privacy in a Sensor-Based Search and Rescue System},
        proceedings={Ad Hoc Networks. First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers},
        proceedings_a={ADHOCNETS},
        year={2012},
        month={7},
        keywords={sensor-based search \& rescue security \& privacy},
        doi={10.1007/978-3-642-11723-7_12}
    }
    
  • Jyh-How Huang
    John Black
    Shivakant Mishra
    Year: 2012
    Security and Privacy in a Sensor-Based Search and Rescue System
    ADHOCNETS
    Springer
    DOI: 10.1007/978-3-642-11723-7_12
Jyh-How Huang1, John Black1, Shivakant Mishra1
  • 1: University of Colorado

Abstract

With the emergence of small devices equipped with wireless communication, several sophisticated systems for search and rescue have been proposed and developed. However, a key obstacle in large deployment of these systems is vulnerability to users’ security and privacy. On one hand, search and rescue systems need to collect as much information about a user’s location and movement as possible to locate that user in a timely manner. On the other hand, this very capability can be misused by adversaries to stalk a person, which in turn drives users away from using such a system. This paper describes the design, implementation and performance of a security and privacy framework for SenSearch, which is a sensor-based search and rescue system for people in emergency situation in wilderness areas. This framework has been carefully built by employing a combination of symmetric and asymmetric key cryptography to meet the constraints of resource-limited devices and short time intervals during which most security operations have to be performed.