Becher A, Benenson Z, Dornseif M (2006)
Publication Type: Conference contribution
Publication year: 2006
Publisher: Springer-verlag
Edited Volumes: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Series: LNCS 3934
City/Town: York, UK
Pages Range: 104-118
Conference Proceedings Title: Security in Pervasive Computing (SPC), Third International Conference
Event location: York
DOI: 10.1007/11734666_9
Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost. © Springer-Verlag Berlin Heidelberg 2006.
APA:
Becher, A., Benenson, Z., & Dornseif, M. (2006). Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In Security in Pervasive Computing (SPC), Third International Conference (pp. 104-118). York: York, UK: Springer-verlag.
MLA:
Becher, Alexander, Zinaida Benenson, and Maximillian Dornseif. "Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks." Proceedings of the 3rd International Conference on Security in Pervasive Computing, SPC 2006, York York, UK: Springer-verlag, 2006. 104-118.
BibTeX: Download