1 September 2004 Special encryption considerations for unattended ground sensor systems
Author Affiliations +
Requirements in Unattended Ground Sensor (UGS) systems have grown to include data privacy, message authentication, and anti-spoofing measures. This presents a challenge to the systems architect to consider approaches that defend against known and unknown attacks designed to compromise the system integrity. Encryption has been the preferred method to address these requirements. Encryption may be used to increase our confidence in the data transmitted in sensor networks, but requires greater, not less, attention to system security. After all, in an unencrypted network, at least we “know” that an adversary can read our data.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Allen P. Drummond, Allen P. Drummond, } "Special encryption considerations for unattended ground sensor systems", Proc. SPIE 5417, Unattended/Unmanned Ground, Ocean, and Air Sensor Technologies and Applications VI, (1 September 2004); doi: 10.1117/12.542451; https://doi.org/10.1117/12.542451


Lightweight hardware monitoring of IoT devices
Proceedings of SPIE (May 02 2018)
Wireless sensor networks
Proceedings of SPIE (October 23 2006)
Hybrid architecture for building secure sensor networks
Proceedings of SPIE (April 04 2012)
Energy-efficient networked sensor transceivers
Proceedings of SPIE (September 17 2003)

Back to Top