Aggregation of Information Leaked by a MANET
暂无分享,去创建一个
Use of a MANET system will inevitably leak information into the operational environment. An adversary can gain and aggregate information from physical sightings, detection of radio signals and eavesdropping, acquisition of node equipment and detection of patterns of system use and response. This paper investigates the information aggregation threat, viewed as a driver of MANET security design. A security assessment method is sketched, involving an abstract ‘information layer’ that bridges between operational scenarios/ vignettes and MANET system and operation design. The approach focuses on the value of information to the adversary. Recommendations are made for further development.
[1] Dan Suciu,et al. A formal analysis of information disclosure in data exchange , 2004, SIGMOD '04.
[2] D. Pinto. Secrets and Lies: Digital Security in a Networked World , 2003 .
[3] Glenn Shafer,et al. The art of causal conjecture , 1996 .
[4] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..