Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks

Becher A, Benenson Z, Dornseif M (2006)


Publication Type: Conference contribution

Publication year: 2006

Journal

Publisher: Springer-verlag

Edited Volumes: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Series: LNCS 3934

City/Town: York, UK

Pages Range: 104-118

Conference Proceedings Title: Security in Pervasive Computing (SPC), Third International Conference

Event location: York

DOI: 10.1007/11734666_9

Abstract

Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost. © Springer-Verlag Berlin Heidelberg 2006.

Authors with CRIS profile

How to cite

APA:

Becher, A., Benenson, Z., & Dornseif, M. (2006). Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In Security in Pervasive Computing (SPC), Third International Conference (pp. 104-118). York: York, UK: Springer-verlag.

MLA:

Becher, Alexander, Zinaida Benenson, and Maximillian Dornseif. "Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks." Proceedings of the 3rd International Conference on Security in Pervasive Computing, SPC 2006, York York, UK: Springer-verlag, 2006. 104-118.

BibTeX: Download