Tampering with motes: real-world physical attacks on wireless sensor networks

  • Authors:
  • Alexander Becher;Zinaida Benenson;Maximillian Dornseif

  • Affiliations:
  • Department of Computer Science, RWTH Aachen, Aachen, Germany;Department of Computer Science, RWTH Aachen, Aachen, Germany;Department of Computer Science, RWTH Aachen, Aachen, Germany

  • Venue:
  • SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.