Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks

  • Alexander Becher
  • Zinaida Benenson
  • Maximillian Dornseif
Conference paper

DOI: 10.1007/11734666_9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3934)
Cite this paper as:
Becher A., Benenson Z., Dornseif M. (2006) Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Clark J.A., Paige R.F., Polack F.A.C., Brooke P.J. (eds) Security in Pervasive Computing. SPC 2006. Lecture Notes in Computer Science, vol 3934. Springer, Berlin, Heidelberg

Abstract

Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Alexander Becher
    • 1
  • Zinaida Benenson
    • 1
  • Maximillian Dornseif
    • 1
  1. 1.Department of Computer ScienceRWTH AachenAachenGermany

Personalised recommendations