Skip to main content

A Passive Approach to Unauthorized Sensor Node Identification

  • Chapter
Wireless Sensor Networks and Applications

Part of the book series: Signals and Communication Technology ((SCT))

As access to power becomes less of a concern (solar powered devices, wind powered devices, longer battery life, AC), the desire for higher bandwidth com- munication, and a desire for easy deployment, sensor networks are increasingly using the 802.11 medium access control (MAC) protocol. Further, some sensor deployment schemes are heterogeneous, using smaller low-powered sensors for traffic routing, but use higher-powered devices that use 802.11 to improve overall performance of the network. Accordingly, in this chapter we discuss security concerns that apply to sensor networks, but extend to any network using the 802.11 MAC, including wireless local area networks (WLANs) and ad hoc networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sunwoong Choi, Kihong Park and Chong-kwon Kim, On the Performance Char-acteristics of WLANs: Revisited, ACM Sigmetrics, Banff, Alberta, Canada, 2005.

    Google Scholar 

  2. The 802.11i Standard, http://standards.ieee.org/ getieee802/download/802.11i-2004.pdf.

  3. Intel, http://www.intel.com/research/exploratory/ heterogeneous.htm.

  4. Chulsung Park, Qiang Xie and Pai H. Chou, DuraNode: Wi-Fi-based Sensor Node for Real-Time Structural Safety Monitoring, The Fourth International Conference on Information Processing in Sensor Networks (IPSN 2005), 2005.

    Google Scholar 

  5. Alefiya Hussain, John Heidemann and Christos Papadopoulos, Identification of repeated attacks using network traffic forensics, USC/Information Sciences Insti-tute, ISI-TR-2003-577b, 2003.

    Google Scholar 

  6. W. Richard Stevens, Unix Network Programming, Prentice Hall, 1998.

    Google Scholar 

  7. A.V. Oppenheim and R.W. Schafer, Discrete-Time Signal Processing, Prentice-Hall, 1989.

    Google Scholar 

  8. C. Partridge, D. Cousins, A.W. Jackson, R. Krishan T. Saxena and T. Strayer, Using Signal Processing to Analyze Wireless Data Traffic, ACM Workshop on Wireless Security (WiSe), Atlanta, GA, 2002.

    Google Scholar 

  9. Chen-Mou Cheng, H.T. Kung and Koan-Sin Ta, Use of spectral analysis in de-fense against DoS attacks, IEEE GLOBECOM, 2002.

    Google Scholar 

  10. M. Lacage, M. Manshaei and T. Turletti, IEEE 802.11 Rate Adaption: A Prac-tical Approach, ACM/IEEE MSWIM, Venice, Italy, 2004.

    Google Scholar 

  11. Tadayoshi Kohno, Andre Briodo and KC Claffy, Remote physical device finger-printing, IEEE Transactions on Dependable and Secure Computing, vol.2 pp.93-108,2005.

    Article  Google Scholar 

  12. Jeyanthi Hall, Michel Barbeau and Evangelos Kranakis, Detection of Transient in Radio Frequency Fingerprinting using Signal Phase, Internet and Information Technology (CIIT), 2004.

    Google Scholar 

  13. www.decodesystems.com/mt/97dec/.

  14. iPass, www.ipass.com/services/services deviceid.html.

  15. Wimetrics, www.wimetrics.com.

  16. Joshua Wright, Detecting Wireless LAN MAC Address Spoofing, home.jwu.edu/jwright.

    Google Scholar 

  17. AirDefense, www.airdefense.net.

  18. Slayer,TheDefinitiveGuideToWirelessWarX’ing, teknik.ekitap.gen.tr/TDGTW-WarXing.html.

    Google Scholar 

  19. William A. Arbaugh, Narendar Shankar and Y.C. Justin Wan, Your 802.11 wireless network has no clothes, http://www.cs.umd.edu/ waa/wireless.pdf.

  20. Nikita Borisov, Ian Golberg and David Wagner, Intercepting mobile communi-cations: The insecurity of 802.11, MOBICOM, 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Corbett, C., Copeland, J., Beyah, R. (2008). A Passive Approach to Unauthorized Sensor Node Identification. In: Li, Y., Thai, M.T., Wu, W. (eds) Wireless Sensor Networks and Applications. Signals and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-49592-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-49592-7_18

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-49591-0

  • Online ISBN: 978-0-387-49592-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics