Publication detail

Security of MICA*-based wireless sensor networks

CVRČEK, D.

Original Title

Security of MICA*-based wireless sensor networks

English Title

Security of MICA*-based wireless sensor networks

Type

conference paper

Language

en

Original Abstract

Firstly, we mention an initial qualitative risk assessment, carried out by interviewing the operating manager of a large suspension bridge and a contractor responsible for part of a large subway tunnel network who want to use wireless sensor networks. The core of the talk deals with assessing the practical security of the particular COTS system adopted by our team, the Crossbow MICAz motes running TinyOS or XMesh, together with the Stargate gateway: we designed and implemented a variety of attacks on this system and we discuss the security problems we found, together with appropriate fixes where possible. While some of our attacks exploit generally known vulnerabilities, others like selective jamming and power exhaustion through routing table manipulation are original and interesting in their own right. In section we also demonstrate how an attacker can undetectably alter messages in an IEEE 802.15.4 radio environment.

English abstract

Firstly, we mention an initial qualitative risk assessment, carried out by interviewing the operating manager of a large suspension bridge and a contractor responsible for part of a large subway tunnel network who want to use wireless sensor networks. The core of the talk deals with assessing the practical security of the particular COTS system adopted by our team, the Crossbow MICAz motes running TinyOS or XMesh, together with the Stargate gateway: we designed and implemented a variety of attacks on this system and we discuss the security problems we found, together with appropriate fixes where possible. While some of our attacks exploit generally known vulnerabilities, others like selective jamming and power exhaustion through routing table manipulation are original and interesting in their own right. In section we also demonstrate how an attacker can undetectably alter messages in an IEEE 802.15.4 radio environment.

Keywords

Wireless network, zigbee, security, attack

RIV year

2008

Released

06.11.2008

Publisher

NEUVEDEN

Location

Berlin

Pages from

1

Pages to

5

Pages count

5

Documents

BibTex


@inproceedings{BUT32589,
  author="Daniel {Cvrček}",
  title="Security of MICA*-based wireless sensor networks",
  annote="Firstly, we mention an initial qualitative risk assessment, carried out by
interviewing the operating manager of a large suspension bridge and a contractor
responsible for part of a large subway tunnel network who want to use wireless
sensor networks. The core of the talk deals with assessing the practical security
of the particular COTS system adopted by our team, the Crossbow MICAz motes
running TinyOS or XMesh, together with the Stargate gateway: we designed and
implemented a variety of attacks on this system and we discuss the security
problems we found, together with appropriate fixes where possible. While some of
our attacks exploit generally known vulnerabilities, others like selective
jamming and power exhaustion through routing table manipulation are original and
interesting in their own right. In section we also demonstrate how an attacker
can undetectably alter messages in an IEEE 802.15.4 radio environment.",
  address="NEUVEDEN",
  booktitle="25th Chaos Communication Congress",
  chapter="32589",
  edition="NEUVEDEN",
  howpublished="print",
  institution="NEUVEDEN",
  year="2008",
  month="november",
  pages="1--5",
  publisher="NEUVEDEN",
  type="conference paper"
}