We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintenance protocols for sensor networks. These protocols aim to increase the lifetime of the sensor network by maintaining only a subset of nodes in an active or awake state. The design of these protocols assumes that the sensor nodes will be deployed in a trusted non-adversarial environment, and does not take into account the impact of attacks launched by malicious insider and outsider nodes. We describe three attacks against these protocols that can be used to reduce the lifetime of the sensor network, or to degrade the functionality of the sensor application by reducing the network connectivity and sensing coverage that can be achieved. Further, we describe counter-measures that can be used to increase the robustness of the protocols and make them resilient to such attacks. © 2005 IEEE.

Securing Topology Maintainance Protocols for Sensor Network: Attacks and Countermeasures / Gabrielli, Andrea; Mancini, Luigi Vincenzo; Setia, S; Jajodia, S.. - 2005:(2005), pp. 101-112. (Intervento presentato al convegno 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005 tenutosi a Athens; Greece nel 5 - 9 September, 2005) [10.1109/SECURECOMM.2005.34].

Securing Topology Maintainance Protocols for Sensor Network: Attacks and Countermeasures

GABRIELLI, Andrea;MANCINI, Luigi Vincenzo;
2005

Abstract

We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintenance protocols for sensor networks. These protocols aim to increase the lifetime of the sensor network by maintaining only a subset of nodes in an active or awake state. The design of these protocols assumes that the sensor nodes will be deployed in a trusted non-adversarial environment, and does not take into account the impact of attacks launched by malicious insider and outsider nodes. We describe three attacks against these protocols that can be used to reduce the lifetime of the sensor network, or to degrade the functionality of the sensor application by reducing the network connectivity and sensing coverage that can be achieved. Further, we describe counter-measures that can be used to increase the robustness of the protocols and make them resilient to such attacks. © 2005 IEEE.
2005
1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005
Network connectivity; Sensor networks; Sensor nodes
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Securing Topology Maintainance Protocols for Sensor Network: Attacks and Countermeasures / Gabrielli, Andrea; Mancini, Luigi Vincenzo; Setia, S; Jajodia, S.. - 2005:(2005), pp. 101-112. (Intervento presentato al convegno 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005 tenutosi a Athens; Greece nel 5 - 9 September, 2005) [10.1109/SECURECOMM.2005.34].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/367827
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 9
  • ???jsp.display-item.citation.isi??? 3
social impact