Firewalling Wireless Sensor Networks: Security by Wireless

被引:0
作者
Martinovic, Ivan [1 ]
Gollan, Nicos [1 ]
Schmitt, Jens B. [1 ]
机构
[1] Univ Kaiserslautern, Disco Distributed Comp Syst Lab, D-67663 Kaiserslautern, Germany
来源
2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2 | 2008年
关键词
Wireless Sensor Networks; Security; Authentication; Implementation; Measurements;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired systems, although their deployment requires careful planning and expensive infrastructure that may be difficult to install or modify. Hence, solutions based on wireless sensor networks (WSNs) are gaining popularity to reduce cost and simplify installation. Clearly, one of the key issues rising from the switch to wireless communication lies in security; while an air gap is among the most effective security measures in wired networks, wireless communication is not as easy to isolate from attack. In this paper, we propose a system leveraging the peculiarities of the wireless medium, such as the broadcast nature of wireless communication and the unpredictability of indoor signal propagation to achieve effective protection against attacks based on the injection of fake data. Using a real-world WSN deployment and a realistic implementation of an attacker, we analyze this protection scheme and demonstrate that neither position change, transmission power manipulation, nor complete knowledge of wireless parameters can help an attacker to successfully attack the network. As a result, this work demonstrates how the chaotic nature of radio communication, which is often considered a disadvantage in regard to security objectives, can be used to enhance protection and support implementation of lightweight security mechanisms.
引用
收藏
页码:753 / 760
页数:8
相关论文
共 19 条
  • [1] [Anonymous], 2001, INT C UB COMP
  • [2] CAGALJ M, 2006, SP 06, P280
  • [3] CAPKUN S, 2007, P 3 INT C SEC PRIV C
  • [4] Shake them up! A movement-based pairing protocol for CPU-constrained devices
    Castelluccia, C
    Mutaf, P
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES (MOBISYS 2005), 2005, : 51 - 64
  • [5] Development of slow scan digital CCD camera for low light level image
    Cheng, Yaoyu
    Hu, Yan
    Li, Yonghong
    [J]. 6TH WSEAS INT CONF ON INSTRUMENTATION, MEASUREMENT, CIRCUITS & SYSTEMS/7TH WSEAS INT CONF ON ROBOTICS, CONTROL AND MANUFACTURING TECHNOLOGY, PROCEEDINGS, 2007, : 193 - +
  • [6] Demirbas M., 2006, P 2006 INT S WORLD W, P564, DOI DOI 10.1109/WOWMOM.2006.27
  • [7] The limits of localization using signal strength: A comparative study
    Elnabrawy, E
    Li, XY
    Martin, RP
    [J]. 2004 FIRST ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2004, : 406 - 414
  • [8] Faria D., 2006, PROC ACM WORKSHOP WI, P43, DOI [DOI 10.1145/1161289.1161298, 10.1145/1161289.1161298]
  • [9] HOWARD A, 2003, P INT C FIELD SERV R
  • [10] *IEEE, 2006, I8021542006 IEEE