We analyze the security vulnerabilities of some well-known topology maintenance protocols (TMPs) for wireless sensor networks. These protocols aim to increase the lifetime of the sensor network by only maintaining a subset of nodes in an active or awake state. The design of these protocols assumes that the sensor nodes will be deployed in a trusted, non-adversarial environment, and does not take into account the impact of attacks launched by malicious insider or outsider nodes. We describe three attacks against these protocols that may be used to reduce the lifetime of the sensor network, or to degrade the functionality of the sensor application by reducing the network connectivity and the sensing coverage that can be achieved. Further, we describe countermeasures, inspired by biological systems and processes, that can be taken to increase the security and fault-tolerance of the protocols. © 2008 Springer Berlin Heidelberg.
Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks / Gabrielli, Andrea; Mancini, Luigi Vincenzo. - 5151 LNCS:(2007), pp. 399-410. (Intervento presentato al convegno 1st Workshop on Bio-Inspired Design of Networks, BIOWIRE 2007 tenutosi a Cambridge; United Kingdom) [10.1007/978-3-540-92191-2_35].
Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks
GABRIELLI, Andrea;MANCINI, Luigi Vincenzo
2007
Abstract
We analyze the security vulnerabilities of some well-known topology maintenance protocols (TMPs) for wireless sensor networks. These protocols aim to increase the lifetime of the sensor network by only maintaining a subset of nodes in an active or awake state. The design of these protocols assumes that the sensor nodes will be deployed in a trusted, non-adversarial environment, and does not take into account the impact of attacks launched by malicious insider or outsider nodes. We describe three attacks against these protocols that may be used to reduce the lifetime of the sensor network, or to degrade the functionality of the sensor application by reducing the network connectivity and the sensing coverage that can be achieved. Further, we describe countermeasures, inspired by biological systems and processes, that can be taken to increase the security and fault-tolerance of the protocols. © 2008 Springer Berlin Heidelberg.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.