Modeling a node capture attack in a secure wireless sensor networks

Autor: Meriem Smache, Jesus-Javier Gilquijano, Nadia El Mrabet, Emmanuel Riou, Chaput Gregory, Assia Tria
Přispěvatelé: École des Mines de Saint-Étienne (Mines Saint-Étienne MSE), Institut Mines-Télécom [Paris] (IMT), Département Systèmes et Architectures Sécurisés (SAS-ENSMSE), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-CMP-GC, Centre Microélectronique de Provence - Site Georges Charpak (CMP-GC) (CMP-ENSMSE), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Gridbee Communications
Rok vydání: 2016
Předmět:
Authentication
business.industry
Computer science
Node (networking)
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
020206 networking & telecommunications
Cryptography
02 engineering and technology
Intrusion detection system
Adversary
Computer security
computer.software_genre
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
Key distribution in wireless sensor networks
Synchronization (computer science)
0202 electrical engineering
electronic engineering
information engineering

[INFO]Computer Science [cs]
[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]
020201 artificial intelligence & image processing
business
computer
Wireless sensor network
ComputingMilieux_MISCELLANEOUS
Computer network
Zdroj: WF-IoT
2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)
2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Dec 2016, Reston, France. pp.188-193, ⟨10.1109/WF-IoT.2016.7845447⟩
DOI: 10.1109/wf-iot.2016.7845447
Popis: We formalize in this work a model for node capture attack in a secure wireless sensor networks (WSNs). The adversary starts by overhearing exchanged messages to learn about the network because of all data transmissions nature (all in the air). Then, it has the physical access to the node, and with appropriate tools, it can read the secret information (like keys, programs, etc.) stored in the victim node memory. After that, we show how it removes that compromised node from the network and redeploys them for performing diverse attacks. Finally, we discuss a proposition of an intrusion detection system (IDS) to avoid this type of attacks.
Databáze: OpenAIRE