1 September 2004 Special encryption considerations for unattended ground sensor systems
Author Affiliations +
Requirements in Unattended Ground Sensor (UGS) systems have grown to include data privacy, message authentication, and anti-spoofing measures. This presents a challenge to the systems architect to consider approaches that defend against known and unknown attacks designed to compromise the system integrity. Encryption has been the preferred method to address these requirements. Encryption may be used to increase our confidence in the data transmitted in sensor networks, but requires greater, not less, attention to system security. After all, in an unencrypted network, at least we “know” that an adversary can read our data.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Allen P. Drummond, "Special encryption considerations for unattended ground sensor systems", Proc. SPIE 5417, Unattended/Unmanned Ground, Ocean, and Air Sensor Technologies and Applications VI, (1 September 2004); doi: 10.1117/12.542451; https://doi.org/10.1117/12.542451


Securing radars using secure wireless sensor networking
Proceedings of SPIE (June 18 2014)
Wireless sensor networks
Proceedings of SPIE (October 24 2006)
Hybrid architecture for building secure sensor networks
Proceedings of SPIE (April 04 2012)
Unattended ground sensor (UGS) systems for homeland defense
Proceedings of SPIE (September 22 2003)

Back to Top