Vulnerabilities and Attacks in Wireless Sensor Networks

We investigate how wireless sensor networks can be attacked in practice. From this we develop a generic adversary model that allows to classify adversaries according to two dimensions of power: presence and intervention. Thus, we provide a framework for realistic security analysis in wireless sensor networks.

[1]  Harald Vogt,et al.  Exploring Message Authentication in Sensor Networks , 2004, ESAS.

[2]  Ken Frazer,et al.  Building secure software: how to avoid security problems the right way , 2002, SOEN.

[3]  Harald Vogt,et al.  Intrusion Detection and Failure Recovery in Sensor Nodes , 2005, GI Jahrestagung.

[4]  Felix C. Freiling,et al.  On the Feasibility and Meaning of Security in Sensor Networks , 2005 .

[5]  Felix C. Freiling,et al.  Simple Evasive Data Storage in Sensor Networks , 2005, IASTED PDCS.

[6]  Jens Grossklags,et al.  Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks , 2003, Mobile Data Management.

[7]  Ross J. Anderson,et al.  Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[8]  Holger Peine Rules of thumb for secure software engineering , 2005, ICSE.

[9]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[10]  David LeBlanc,et al.  Writing Secure Code , 2001 .

[11]  Geoff Martin,et al.  An Evaluation of Ad-hoc Routing Protocols for Wireless Sensor Networks , 2004 .

[12]  Martina Zitterbart,et al.  An efficient key establishment scheme for secure aggregating sensor networks , 2006, ASIACCS '06.

[13]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[14]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[15]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[16]  Markus G. Kuhn,et al.  Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.

[17]  Andrew Blyth,et al.  Secure coding — principles and practices , 2004 .

[18]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[19]  Kenneth R. van Wyk,et al.  Secure Coding: Principles and Practices , 2003 .

[20]  Ross J. Anderson,et al.  Optical Fault Induction Attacks , 2002, CHES.

[21]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[22]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[23]  Tassos Dimitriou,et al.  Secure and Efficient In-Network Processing for Sensor Networks , 2004 .

[24]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[25]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[26]  Sergei Skorobogatov,et al.  Semi-invasive attacks: a new approach to hardware security analysis , 2005 .

[27]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[28]  M. Zitterbart,et al.  A security-energy trade-off for authentic aggregation in sensor networks , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.

[29]  Yongdae Kim,et al.  Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.

[30]  John Viega,et al.  Secure programming cookbook for C and C , 2003 .

[31]  Zinaida Benenson,et al.  An algorithmic framework for robust access control in wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[32]  Shivakant Mishra,et al.  A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.