Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks
- Cite this paper as:
- Becher A., Benenson Z., Dornseif M. (2006) Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Clark J.A., Paige R.F., Polack F.A.C., Brooke P.J. (eds) Security in Pervasive Computing. SPC 2006. Lecture Notes in Computer Science, vol 3934. Springer, Berlin, Heidelberg
Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.
Unable to display preview. Download preview PDF.