Denial-of-service in wireless sencsor networks: Attacks and defenses

被引:234
作者
Raymond, David R. [1 ]
Midkiff, Scott F. [1 ]
机构
[1] Virginia Tech, Bardley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
D O I
10.1109/MPRV.2008.6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSN) denial-of-service (DoS) attacks targeting energy-efficient protocols are studied by exploring network characteristics and adoption of general security mechanisms to account for these characteristics. Security Protocols for Sensor Networks (SPINS) provide broadcast authentication, two-party authentication, and data confidentiality using symmetric cryptography. DoS attacks focus on physical aspects of sensor node with an acoustic barrier to reduce network sensitivity. Medium Access Protocols (MAC) are focused for DoS as they control the functionality of the transceiver, which consumes more energy than any other component on wireless sensor platforms. An attacker achieves DoS by jamming or destroying the key network nodes by header encryption technique, to analyze the volume of traffic in various portions of the network.
引用
收藏
页码:74 / 81
页数:8
相关论文
共 21 条
[1]  
[Anonymous], 2005, P ACM MOBIHOC, DOI DOI 10.1145/1062689.1062697
[2]  
[Anonymous], 2003, P SENSYS, DOI DOI 10.1145/958491.958494
[3]  
Crosby GV, 2006, DSSNS 2006: SECOND IEEE WORKSHOP ON DEPENDABILITY AND SECURITY IN SENSOR NETWORKS AND SYSTEMS, P13
[4]  
Dam T. V., 2003, P 1 INT C EMB NETW S, P171, DOI DOI 10.1145/958491.958512
[5]  
Deng J, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P637
[6]  
Deng J., 2005, SASN '05: Proceedings of the 3rd ACM workshop 138 on Security of ad hoc and sensor networks, P89, DOI [10.1145/1102219.1102235, DOI 10.1145/1102219.1102235]
[7]  
Dutta PK, 2006, IPSN 2006: THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, P326
[8]  
HUI JW, 2004, P 2 INT C EMB NETW S, P81, DOI [DOI 10.1145/1031495.1031506, 10.1145/1031495.1031506]
[9]  
IEEE, 2003, 802154 IEEE
[10]   Secure routing in wireless sensor networks: Attacks and countermeasures [J].
Karlof, C ;
Wagner, D .
PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, 2003, :113-127