Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. Becher, A., Benenson, Z., & Dornseif, M. In Clark, J. A., Paige, R. F., Polack, F. A. C., & Brooke, P. J., editors, Security in Pervasive Computing, of Lecture Notes in Computer Science, pages 104–118. Springer Berlin Heidelberg, April, 2006. Paper doi abstract bibtex Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.
@incollection{becher_tampering_2006,
series = {Lecture {Notes} in {Computer} {Science}},
title = {Tampering with {Motes}: {Real}-{World} {Physical} {Attacks} on {Wireless} {Sensor} {Networks}},
copyright = {©2006 Springer Berlin Heidelberg},
isbn = {978-3-540-33376-0 978-3-540-33377-7},
shorttitle = {Tampering with {Motes}},
url = {http://link.springer.com/chapter/10.1007/11734666_9},
abstract = {Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.},
language = {en},
number = {3934},
urldate = {2016-01-27TZ},
booktitle = {Security in {Pervasive} {Computing}},
publisher = {Springer Berlin Heidelberg},
author = {Becher, Alexander and Benenson, Zinaida and Dornseif, Maximillian},
editor = {Clark, John A. and Paige, Richard F. and Polack, Fiona A. C. and Brooke, Phillip J.},
month = apr,
year = {2006},
doi = {10.1007/11734666_9},
pages = {104--118}
}
Downloads: 0
{"_id":"BdCbt4rZfHkk5HGZW","bibbaseid":"becher-benenson-dornseif-tamperingwithmotesrealworldphysicalattacksonwirelesssensornetworks-2006","authorIDs":[],"author_short":["Becher, A.","Benenson, Z.","Dornseif, M."],"bibdata":{"bibtype":"incollection","type":"incollection","series":"Lecture Notes in Computer Science","title":"Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks","copyright":"©2006 Springer Berlin Heidelberg","isbn":"978-3-540-33376-0 978-3-540-33377-7","shorttitle":"Tampering with Motes","url":"http://link.springer.com/chapter/10.1007/11734666_9","abstract":"Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.","language":"en","number":"3934","urldate":"2016-01-27TZ","booktitle":"Security in Pervasive Computing","publisher":"Springer Berlin Heidelberg","author":[{"propositions":[],"lastnames":["Becher"],"firstnames":["Alexander"],"suffixes":[]},{"propositions":[],"lastnames":["Benenson"],"firstnames":["Zinaida"],"suffixes":[]},{"propositions":[],"lastnames":["Dornseif"],"firstnames":["Maximillian"],"suffixes":[]}],"editor":[{"propositions":[],"lastnames":["Clark"],"firstnames":["John","A."],"suffixes":[]},{"propositions":[],"lastnames":["Paige"],"firstnames":["Richard","F."],"suffixes":[]},{"propositions":[],"lastnames":["Polack"],"firstnames":["Fiona","A.","C."],"suffixes":[]},{"propositions":[],"lastnames":["Brooke"],"firstnames":["Phillip","J."],"suffixes":[]}],"month":"April","year":"2006","doi":"10.1007/11734666_9","pages":"104–118","bibtex":"@incollection{becher_tampering_2006,\n\tseries = {Lecture {Notes} in {Computer} {Science}},\n\ttitle = {Tampering with {Motes}: {Real}-{World} {Physical} {Attacks} on {Wireless} {Sensor} {Networks}},\n\tcopyright = {©2006 Springer Berlin Heidelberg},\n\tisbn = {978-3-540-33376-0 978-3-540-33377-7},\n\tshorttitle = {Tampering with {Motes}},\n\turl = {http://link.springer.com/chapter/10.1007/11734666_9},\n\tabstract = {Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.},\n\tlanguage = {en},\n\tnumber = {3934},\n\turldate = {2016-01-27TZ},\n\tbooktitle = {Security in {Pervasive} {Computing}},\n\tpublisher = {Springer Berlin Heidelberg},\n\tauthor = {Becher, Alexander and Benenson, Zinaida and Dornseif, Maximillian},\n\teditor = {Clark, John A. and Paige, Richard F. and Polack, Fiona A. C. and Brooke, Phillip J.},\n\tmonth = apr,\n\tyear = {2006},\n\tdoi = {10.1007/11734666_9},\n\tpages = {104--118}\n}\n\n","author_short":["Becher, A.","Benenson, Z.","Dornseif, M."],"editor_short":["Clark, J. A.","Paige, R. F.","Polack, F. A. C.","Brooke, P. J."],"key":"becher_tampering_2006","id":"becher_tampering_2006","bibbaseid":"becher-benenson-dornseif-tamperingwithmotesrealworldphysicalattacksonwirelesssensornetworks-2006","role":"author","urls":{"Paper":"http://link.springer.com/chapter/10.1007/11734666_9"},"downloads":0},"bibtype":"incollection","biburl":"https://bibbase.org/zotero/ky25","creationDate":"2019-05-11T17:47:04.661Z","downloads":0,"keywords":[],"search_terms":["tampering","motes","real","world","physical","attacks","wireless","sensor","networks","becher","benenson","dornseif"],"title":"Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks","year":2006,"dataSources":["XxiQtwZYfozhQmvGR"]}