Detail publikačního výsledku

Security of MICA*-based wireless sensor networks

CVRČEK, D.

Original Title

Security of MICA*-based wireless sensor networks

English Title

Security of MICA*-based wireless sensor networks

Type

Paper in proceedings outside WoS and Scopus

Original Abstract

Firstly, we mention an initial qualitative risk assessment, carried out by interviewing the operating manager of a large suspension bridge and a contractor responsible for part of a large subway tunnel network who want to use wireless sensor networks. The core of the talk deals with assessing the practical security of the particular COTS system adopted by our team, the Crossbow MICAz motes running TinyOS or XMesh, together with the Stargate gateway: we designed and implemented a variety of attacks on this system and we discuss the security problems we found, together with appropriate fixes where possible. While some of our attacks exploit generally known vulnerabilities, others like selective jamming and power exhaustion through routing table manipulation are original and interesting in their own right. In section we also demonstrate how an attacker can undetectably alter messages in an IEEE 802.15.4 radio environment.

English abstract

Firstly, we mention an initial qualitative risk assessment, carried out by interviewing the operating manager of a large suspension bridge and a contractor responsible for part of a large subway tunnel network who want to use wireless sensor networks. The core of the talk deals with assessing the practical security of the particular COTS system adopted by our team, the Crossbow MICAz motes running TinyOS or XMesh, together with the Stargate gateway: we designed and implemented a variety of attacks on this system and we discuss the security problems we found, together with appropriate fixes where possible. While some of our attacks exploit generally known vulnerabilities, others like selective jamming and power exhaustion through routing table manipulation are original and interesting in their own right. In section we also demonstrate how an attacker can undetectably alter messages in an IEEE 802.15.4 radio environment.

Keywords

Wireless network, zigbee, security, attack

Key words in English

Wireless network, zigbee, security, attack

Authors

CVRČEK, D.

Released

06.11.2008

Location

Berlin

Book

25th Chaos Communication Congress

Pages from

1

Pages to

5

Pages count

5

Full text in the Digital Library

BibTex

@inproceedings{BUT32589,
  author="Daniel {Cvrček}",
  title="Security of MICA*-based wireless sensor networks",
  booktitle="25th Chaos Communication Congress",
  year="2008",
  pages="1--5",
  address="Berlin"
}