Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks

Conference contribution


Publication Details

Author(s): Becher A, Benenson Z, Dornseif M
Title edited volumes: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Publisher: Springer-verlag
Publishing place: York, UK
Publication year: 2006
Title of series: LNCS 3934
Conference Proceedings Title: Security in Pervasive Computing (SPC), Third International Conference
Pages range: 104-118
ISSN: 0302-9743


Abstract

Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost. © Springer-Verlag Berlin Heidelberg 2006.


FAU Authors / FAU Editors

Benenson, Zinaida Dr.
Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen)


How to cite

APA:
Becher, A., Benenson, Z., & Dornseif, M. (2006). Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In Security in Pervasive Computing (SPC), Third International Conference (pp. 104-118). York: York, UK: Springer-verlag.

MLA:
Becher, Alexander, Zinaida Benenson, and Maximillian Dornseif. "Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks." Proceedings of the 3rd International Conference on Security in Pervasive Computing, SPC 2006, York York, UK: Springer-verlag, 2006. 104-118.

BibTeX: 

Last updated on 2018-28-12 at 13:53