Firewalling Wireless Sensor Networks: Security by Wireless

被引:0
作者
Martinovic, Ivan [1 ]
Gollan, Nicos [1 ]
Schmitt, Jens B. [1 ]
机构
[1] Univ Kaiserslautern, Disco Distributed Comp Syst Lab, D-67663 Kaiserslautern, Germany
来源
2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2 | 2008年
关键词
Wireless Sensor Networks; Security; Authentication; Implementation; Measurements;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired systems, although their deployment requires careful planning and expensive infrastructure that may be difficult to install or modify. Hence, solutions based on wireless sensor networks (WSNs) are gaining popularity to reduce cost and simplify installation. Clearly, one of the key issues rising from the switch to wireless communication lies in security; while an air gap is among the most effective security measures in wired networks, wireless communication is not as easy to isolate from attack. In this paper, we propose a system leveraging the peculiarities of the wireless medium, such as the broadcast nature of wireless communication and the unpredictability of indoor signal propagation to achieve effective protection against attacks based on the injection of fake data. Using a real-world WSN deployment and a realistic implementation of an attacker, we analyze this protection scheme and demonstrate that neither position change, transmission power manipulation, nor complete knowledge of wireless parameters can help an attacker to successfully attack the network. As a result, this work demonstrates how the chaotic nature of radio communication, which is often considered a disadvantage in regard to security objectives, can be used to enhance protection and support implementation of lightweight security mechanisms.
引用
收藏
页码:753 / 760
页数:8
相关论文
共 19 条
[11]  
Karlof C., 2004, P 2 INT C EMB NETW S, P162, DOI DOI 10.1145/1031495.1031515
[12]   Robotics-based location sensing using wireless Ethernet [J].
Ladd, AM ;
Bekris, KE ;
Rudys, A ;
Kavraki, LE ;
Wallach, DS .
WIRELESS NETWORKS, 2005, 11 (1-2) :189-204
[13]   TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks [J].
Liu, An ;
Ning, Peng .
2008 INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, PROCEEDINGS, 2008, :245-256
[14]  
LYMBEROPOULOS D, 2006, 3 EUR WORKSH WIR SEN, P326
[15]  
MARTINOVIC I, 2008, P ACM C WIR NETW SEC, P43
[16]  
MEZZOUR LMG, 2007, IPSN 07, P479
[17]  
Rappaport T., 2001, WIRELESS COMMUNICATI
[18]   COMMUNICATION THEORY OF SECRECY SYSTEMS [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04) :656-715
[19]  
*T INSTR, CC2420 RAD DAT