Security in Border Control and Area Monitoring

Daniela Krüger, Christian Haas 1 , Peter Rothenpieler 2 , Denise Dudek 3  and Dennis Pfisterer 4
  • 1  Karlsruhe Institute of Technology, Institute of Telematics, Karlsruhe
  • 2  University of Lübeck, Institute of Telematics, Lübeck
  • 3  Karlsruhe Institute of Technology, Institute of Telematics, Karlsruhe
  • 4  University of Lübeck, Institute of Telematics, Lübeck, Deutschland


Area monitoring is one of the most popular application scenarios for wireless sensor networks. The pure task of distributed object tracking has often been investigated, but little attention has been given to secure object tracking. This article contains a security analysis and an attacker model for the scenario of secure border surveillance and describes security mechanisms and protocols as well as a realization of such a system.

Purchase article
Get instant unlimited access to the article.
Log in
Already have access? Please log in.

Log in with your institution

Journal + Issues

it - Information Technology is a strictly peer-reviewed scientific journal. It is the oldest German journal in the field of information technology. Today, the major aim of it - Information Technology is highlighting issues on ongoing newsworthy areas in information technology and informatics and their application. It aims at presenting the topics with a holistic view.