Abstract
Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Inc., Chichester (2001)
Anderson, R.J., Kuhn, M.G.: Low cost attacks on tamper resistant devices. In: Proceedings of the 5th International Workshop on Security Protocols, pp. 125–136. Springer, London (1998)
Atmel Corp. AT45DB041B datasheet. Atmel document no. 3443, available at: http://www.atmel.com/dyn/resources/prod_documents/doc3443.pdf
Atmel Corp. ATmega128 datasheet. Atmel document no. 2467, available at: http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf
FU Berlin. ScatterWeb Embedded Sensor Board, Online at: http://www.inf.fu-berlin.de/inst/ag-tech/scatterweb_net/esb/
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, May 2003, pp. 197–213 (2003)
Chipcon AS. CC1000 datasheet, Available at: http://www.chipcon.com/files/CC1000_Data_Sheet_2_3.pdf
Chipcon AS. CC2420 datasheet, Available at: http://www.chipcon.com/files/CC2420_Data_Sheet_1_2.pdf
Crossbow, Inc. MICA2 data sheet, Available at: http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf
Crossbow, Inc. MPR, MIB user’s manual, Available at: http://www.xbow.com/Support/Support_pdf_files/MPR-MIB_Series_Users_Manual.pdf
Graff, M.G., van Wyk, K.R.: Secure Coding: Principles and Practices. O’Reilly & Associates, Inc., Sebastopol (2003)
Hwang, J., Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: SASN 2004: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 43–52. ACM Press, New York (2004)
Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: Second ACM Conference on Embedded Networked Sensor Systems (SensSys 2004) (November 2004)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols (September 2003)
Martin, G.: An evaluation of ad-hoc routing protocols for wireless sensor networks. Master’s thesis, University of Newcastle upon Tyne (May 2004)
McGraw, G., Viega, J.: Building Secure Software: How to Avoid Security Problems the Right Way. Addison-Wesley, Reading (2001)
Microchip Technology. 24AA64/24LC64 datasheet, Available at: http://ww1.microchip.com/downloads/en/DeviceDoc/21189K.pdf
RF Monolithics. TR1001 datasheet, Available at: http://www.rfm.com/products/data/tr1001.pdf
moteiv Corp. Telos revision B datasheet, Available at: http://www.moteiv.com/products/docs/telos-revb-datasheet.pdf
moteiv Corp. Tmote Sky datasheet, Available at: http://www.moteiv.com/products/docs/tmote-sky-datasheet.pdf
Peine, H.: Rules of thumb for secure software engineering. In: ICSE 2005: Proceedings of the 27th international conference on Software engineering, pp. 702–703. ACM Press, New York (2005)
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)
Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Communications 11(6) (December 2004)
Skorobogatov, S.P.: Semi-invasive attacks - a new approach to hardware security analysis. Technical report, University of Cambridge, Computer Laboratory, April, Technical Report UCAM-CL-TR-630 (2005)
Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2–12. Springer, Heidelberg (2003)
STMicroelectronics. M25P80 datasheet, Available at: http://www.st.com/stonline/products/literature/ds/8495.pdf
Texas Instruments. Features of the MSP430 bootstrap loader (rev. B). TI Application note SLAA089B, available at: http://www-s.ti.com/sc/psheets/slaa089b/slaa089b.pdf
Texas Instruments. MSP430 F149 datasheet, Available at: http://www-s.ti.com/sc/ds/msp430f149.pdf
Texas Instruments. MSP430 F1611 datasheet, Available at: http://www-s.ti.com/sc/ds/msp430f1611.pdf
Texas Instruments. MSP430x1xx family: User’s guide. TI Application note SLAU049E, available at: http://www-s.ti.com/sc/psheets/slau049e/slau049e.pdf
Viega, J., Messier, M., Spafford, G.: Secure Programming Cookbook for C and C++. O’Reilly & Associates, Inc., Sebastopol (2003)
Vogt, H., Ringwald, M., Strasser, M.: Intrusion detection and failure recovery in sensor nodes. In: Tagungsband INFORMATIK 2005, Workshop Proceedings. LNCS, Springer, Heidelberg, Germany (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Becher, A., Benenson, Z., Dornseif, M. (2006). Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds) Security in Pervasive Computing. SPC 2006. Lecture Notes in Computer Science, vol 3934. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734666_9
Download citation
DOI: https://doi.org/10.1007/11734666_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33376-0
Online ISBN: 978-3-540-33377-7
eBook Packages: Computer ScienceComputer Science (R0)