Detail publikace

Security of MICA*-based wireless sensor networks

Originální název

Security of MICA*-based wireless sensor networks

Anglický název

Security of MICA*-based wireless sensor networks

Jazyk

en

Originální abstrakt

Firstly, we mention an initial qualitative risk assessment, carried out by interviewing the operating manager of a large suspension bridge and a contractor responsible for part of a large subway tunnel network who want to use wireless sensor networks. The core of the talk deals with assessing the practical security of the particular COTS system adopted by our team, the Crossbow MICAz motes running TinyOS or XMesh, together with the Stargate gateway: we designed and implemented a variety of attacks on this system and we discuss the security problems we found, together with appropriate fixes where possible. While some of our attacks exploit generally known vulnerabilities, others like selective jamming and power exhaustion through routing table manipulation are original and interesting in their own right. In section we also demonstrate how an attacker can undetectably alter messages in an IEEE 802.15.4 radio environment.

Anglický abstrakt

Firstly, we mention an initial qualitative risk assessment, carried out by interviewing the operating manager of a large suspension bridge and a contractor responsible for part of a large subway tunnel network who want to use wireless sensor networks. The core of the talk deals with assessing the practical security of the particular COTS system adopted by our team, the Crossbow MICAz motes running TinyOS or XMesh, together with the Stargate gateway: we designed and implemented a variety of attacks on this system and we discuss the security problems we found, together with appropriate fixes where possible. While some of our attacks exploit generally known vulnerabilities, others like selective jamming and power exhaustion through routing table manipulation are original and interesting in their own right. In section we also demonstrate how an attacker can undetectably alter messages in an IEEE 802.15.4 radio environment.

BibTex


@inproceedings{BUT32589,
  author="Daniel {Cvrček}",
  title="Security of MICA*-based wireless sensor networks",
  annote="Firstly, we mention an initial qualitative risk assessment, carried out by
interviewing the operating manager of a large suspension bridge and a contractor
responsible for part of a large subway tunnel network who want to use wireless
sensor networks. The core of the talk deals with assessing the practical security
of the particular COTS system adopted by our team, the Crossbow MICAz motes
running TinyOS or XMesh, together with the Stargate gateway: we designed and
implemented a variety of attacks on this system and we discuss the security
problems we found, together with appropriate fixes where possible. While some of
our attacks exploit generally known vulnerabilities, others like selective
jamming and power exhaustion through routing table manipulation are original and
interesting in their own right. In section we also demonstrate how an attacker
can undetectably alter messages in an IEEE 802.15.4 radio environment.",
  address="NEUVEDEN",
  booktitle="25th Chaos Communication Congress",
  chapter="32589",
  edition="NEUVEDEN",
  howpublished="print",
  institution="NEUVEDEN",
  year="2008",
  month="november",
  pages="1--5",
  publisher="NEUVEDEN",
  type="conference paper"
}