Modeling a node capture attack in a secure wireless sensor networks
Autor: | Meriem Smache, Jesus-Javier Gilquijano, Nadia El Mrabet, Emmanuel Riou, Chaput Gregory, Assia Tria |
---|---|
Přispěvatelé: | École des Mines de Saint-Étienne (Mines Saint-Étienne MSE), Institut Mines-Télécom [Paris] (IMT), Département Systèmes et Architectures Sécurisés (SAS-ENSMSE), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-CMP-GC, Centre Microélectronique de Provence - Site Georges Charpak (CMP-GC) (CMP-ENSMSE), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Gridbee Communications |
Rok vydání: | 2016 |
Předmět: |
Authentication
business.industry Computer science Node (networking) ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS 020206 networking & telecommunications Cryptography 02 engineering and technology Intrusion detection system Adversary Computer security computer.software_genre [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] Key distribution in wireless sensor networks Synchronization (computer science) 0202 electrical engineering electronic engineering information engineering [INFO]Computer Science [cs] [INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET] 020201 artificial intelligence & image processing business computer Wireless sensor network ComputingMilieux_MISCELLANEOUS Computer network |
Zdroj: | WF-IoT 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT) 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Dec 2016, Reston, France. pp.188-193, ⟨10.1109/WF-IoT.2016.7845447⟩ |
DOI: | 10.1109/wf-iot.2016.7845447 |
Popis: | We formalize in this work a model for node capture attack in a secure wireless sensor networks (WSNs). The adversary starts by overhearing exchanged messages to learn about the network because of all data transmissions nature (all in the air). Then, it has the physical access to the node, and with appropriate tools, it can read the secret information (like keys, programs, etc.) stored in the victim node memory. After that, we show how it removes that compromised node from the network and redeploys them for performing diverse attacks. Finally, we discuss a proposition of an intrusion detection system (IDS) to avoid this type of attacks. |
Databáze: | OpenAIRE |
Externí odkaz: |