StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Privacy Concerns of Sensor Networks - Coursework Example

Cite this document
Summary
The author of this coursework "Privacy Concerns of Sensor Networks" comments on the problems occurred with sensor networks and solutions. It is mentioned that employers might use them to spy on employees, neighbors on other neighbors, shopkeepers on their customers, etc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Privacy Concerns of Sensor Networks
Read Text Preview

Extract of sample "Privacy Concerns of Sensor Networks"

What are the privacy concerns about sensor networks, and what are some of the solutions? One of the problems with sensor networks is that they can beabused to spy on individuals. For instance, employers might use them to spy on employees, neighbors on other neighbors, shopkeepers on their customers, etc. (Perrig, 2004, p. 55). This is because these sensors are getting smaller and more high tech with each passing year, so they are virtually undetectable. In order to curtail abuse, new laws must be put into place and individuals who abuse these sensor networks must be aggressively pursued.

Furthermore, individuals who want to use the sensor networks for legitimate purposes – say shopkeepers who need to surveil customers to make sure that they are not shoplifting – need to first apply for a license or permit to do so, and must make a prominent disclosure that these devices are in place. This is necessary to protect the privacy of all involved.What are some of the security issues with sensor networks and some of the solutions? Information that is sent over the networks may be modified by hackers, rendering it unavailable.

The time synchronization of sensor networks may also be thwarted by adversaries by masquerade attacks, replay attacks and delay attacks. (Bojkovic, 2008, pp. 107, 112). An Intrusion Detection System (IDS) is one way of combating threats. The IDS protects the WSN by monitoring it, alerting the user that an attack has occurred and reconfiguring the network and marking the root of the malicious problem. The IDS works either by preventing known attacks by matching attack signatures against the monitored system, or by anomaly detection, in which anomalies in data profiles are identified.

The first of these solutions has the drawback of not recognizing new attacks; the second has the drawback of creating a high number of false alarms.What are some of the other problems with sensor networks, other than privacy and security issues? One of the problems with sensor networks is the risk of data misrepresentation, as all relevant information is impossible to gather in the sensornet environment, as all data that is collected represents data from a discrete time and space, hence it might be taken out of context.

Also, the readings are only approximate for the same reason – that the data collected represent the state of the world at a particular time and space, which is the time and space where the samples were acquired. Therefore, the accuracy of the data that is acquired is subject to misrepresentation and inaccuracies even in situations where security is not compromised.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy Concerns of Sensor Networks Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Privacy Concerns of Sensor Networks Coursework Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1568584-follow-up-to-sensor-networks
(Privacy Concerns of Sensor Networks Coursework Example | Topics and Well Written Essays - 500 Words)
Privacy Concerns of Sensor Networks Coursework Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1568584-follow-up-to-sensor-networks.
“Privacy Concerns of Sensor Networks Coursework Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1568584-follow-up-to-sensor-networks.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy Concerns of Sensor Networks

Network Security And Management

Analytical redundancy can be employed to provide an estimate for a sensor signal in the presence of a sensor fault or even total loss of the sensor.... Albeit the so calculated estimate of the sensor readout may be good enough to control the process for some time after a sensor loss, in the interest of optimal control, it is typically not advisable to abandon the sensor totally in the system design....
3 Pages (750 words) Article

The Scottish Road Network Authority

Indeed, one can hardly find a similar issue in which almost same concerns are voiced.... This report examines a fictionalized case study on Scottish Road Network Authority (SRNA).... The report lays out knowledge sharing problem in SRNA in a context of change management proposition....
5 Pages (1250 words) Research Paper

The Scottish Road Network Authority: Knowledge Sharing

Indeed, one can hardly find a similar issue in which almost the same concerns are voiced.... This report “The Scottish Road Network Authority: Knowledge Sharing” examines a fictionalized case study on Scottish Road Network Authority (SRNA).... The report lays out a knowledge-sharing problem in SRNA in the context of change management proposition....
5 Pages (1250 words) Assignment

BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK

The Art of Wireless sensor networks: Volume 1: Fundamentals.... Visual Information Processing in Wireless sensor networks: Technology, Trends, and Applications.... Wireless sensor networks and Applications.... Localization Algorithms and Strategies for Wireless sensor networks.... In addition, different kinds of sensor nodes like underground, camera, ground, and mobile sensors provide dissimilar coverage potentials....
1 Pages (250 words) Research Paper

The future of privacy

Many and more people are now conversant with computer networks, and it is now easy to hack into someone's account, and gain access to their private information.... A limit should be set to privacy is a fundamental right, and everyone is entitled to it.... Understanding that technology will keep developing will help find better ways that will curb the violation of privacy.... Passwords will no longer be safe to be used for privacy measures, and this will call for new methods to be used to guarantee the users security....
4 Pages (1000 words) Essay

Privacy, Security and Anoymity in P2P networks for Multimedia Distribution: Challenges and Solutions

This paper conducts a literature survey of the various pertinent studies on the subject with the intention of describing the challenges and solutions that are associated with the P2P networks.... hellip; This research will begin with the statement that recent decades have witnessed a swift development in the P2P networks and increased utilization of the technology, especially in the multimedia distribution.... The popularity of these networks has elicited the need of examining the security consequences of the system to the users, networks, and institutions....
6 Pages (1500 words) Research Paper

Intelligence and the Increasing Advancement in the Technology

This paper "Intelligence and the Increasing Advancement in the Technology" focuses on the fact that the world has been witnessing continuous technological advancements due to which many technologies are getting quickly obsolete.... The advancement has provided significant advantages to the people....
9 Pages (2250 words) Case Study

Security in Wireless Sensor Networks

… The paper “Security in Wireless sensor networks” is an actual example of a lab report on information technology.... The paper “Security in Wireless sensor networks” is an actual example of a lab report on information technology.... However, the sensor networks, in addition, introduce an enormous resource constraint as a result of their absence of information storage and power.... All these are a representation of the main hindrances to the realization of the conventional computer security approach within the wireless sensor networks....
11 Pages (2750 words) Lab Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us