Tampering with motes: Real-world physical attacks on wireless sensor networks

被引:0
作者
Becher, Alexander [1 ]
Benenson, Zinaida [1 ]
Dornseif, Maximillian [1 ]
机构
[1] Rhein Westfal TH Aachen, Dept Comp Sci, D-52056 Aachen, Germany
来源
SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS | 2006年 / 3934卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.
引用
收藏
页码:104 / 118
页数:15
相关论文
共 19 条
  • [1] Science and the savage: The Linnean Society of New South Wales, 1874 -1900
    Anderson, K
    [J]. ECUMENE, 1998, 5 (02): : 125 - 143
  • [2] Anderson Ross., 2001, SECURITY ENG GUIDE B
  • [3] *ATM CORP, 3443 ATM CORP
  • [4] *ATM CORP, 2467 ATM CORP
  • [5] *CROSSB INC, MPR MIB US MAN
  • [6] Graff MG., 2003, Secure Coding: Principles and Practices
  • [7] HWANG J, 2004, P 2 ACM WORKSH SEC A, P43
  • [8] KARLOF C, 2004, 2 ACM C EMB NETW SEN
  • [9] Karlof Chris, 2003, ELSEVIERS AD HOC NET
  • [10] MARTIN G, 2004, THESIS U NEWCASTLE T