Accession Number:



InvisibleSensing: Security Through Invisibility for Dynamically Changing Wireless Sensor Networks Section II A 2 ARO, RESEARCH AREA 5: COMPUTING SCIENCE, 5.3 Information and Software Assurance

Descriptive Note:

Technical Report,01 Oct 2015,30 May 2018

Corporate Author:

University of Tennessee at Knoxville Knoxville United States

Personal Author(s):

Report Date:


Pagination or Media Count:



Major Goals The proposed research focuses on the development of the fundamental mathematics necessary to analyze the behavior of wireless networks in contested environments, and leveraging such behavior to design an adaptable secure sensing system, InvisibleSensing, suitable for deployment in dynamically changing environments. We propose to explore a new design paradigm where security is achieved through invisibility, i.e., making sensitive sensors and their transmissions disappear by letting the sensors masquerade as general-purpose or other unsuspicious devices in their changing environments. It can greatly raise the bar for adversaries since they need to figure out if their targets are present at all. Our proposed secure sensing system, InvisibleSensing, is intended for military applications where special-purpose sensors are used to monitor and report events that may be of adversaries interests. InvisibleSensing provides security protection by tricking adversaries into believing that normal traffic is taking place in the system so that our sensors do not become the targets in the first place. Success in devising the invisibility paradigm could potentially change the way modern military security systems are designed and enhance the protection of wireless sensor networks and applications that are highly sensitive in nature. In particular, main goals of the proposed research consist of 1. Formally define the new security concept invisibility and devise metrics to measure invisibility. 2. Design and develop the InvisibleSensing system to achieve invisibility and efficiency in terms of computation and communication, aiming for practical deployment.3. Evaluate the security and efficiency of InvisibleSensing by extensive simulations, as well as experiments using hardware testbed.

Subject Categories:

  • Computer Systems Management and Standards

Distribution Statement: