Skip to main content

Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 294))

Abstract

Security is a crucial matter for Wireless Sensor Networks. With the recent introduction of Energy-Harvesting nodes, it has gained even more importance. By exploiting the ability of scavenging energy from the surrounding environment, the lifespan of a node has drastically increased. This is one of the reasons why security needs a new take in this topic. Traditional solutions may not work in this new domain. Brand new challenges and threats may arise and new solutions have to be designed. In this paper we present a first taxonomy of attacks, focusing on how they change in the energy-harvesting context compared to regular sensor networks. We also discuss existing security solutions specific for the energy harvesting world and comment on the trend that this topic may follow in the future. Finally, we draw a comparison between the cyber-physical attacker we define in our model and adversary models belonging to security protocols verification literature.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blanchet, B.: Computationally Sound Mechanized Proofs of Correspondence Assertions. In: 20th IEEE Computer Security Foundations Symposium (CSF 2007), Venice, Italy, pp. 97–111 (2007)

    Google Scholar 

  2. Blanchet, B.: Automatic Verification of Correspondences for Security Protocols. Journal of Computer Security 17(4), 363–434 (2009)

    Google Scholar 

  3. Buchholtz, M., Nielson, H.R., Nielson, F.: A Calculus for Control Flow Analysis of Security Protocols. International Journal of Information Security 2(3-4), 145–167 (2004)

    Article  Google Scholar 

  4. Dolev, D., Yao, A.: On the Security of Public Key Protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)

    Article  MATH  MathSciNet  Google Scholar 

  5. Basin, D., Cremers, C.: Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. In: Dawar, A., Veith, H. (eds.) CSL 2010. LNCS, vol. 6247, pp. 1–18. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Basin, D.A., Capkun, S., Schaller, P., Schmidt, B.: Formal Reasoning about Physical Properties of Security Protocols. ACM Trans. Inf. Syst. Secur. 14(2), 16 (2011)

    Article  Google Scholar 

  7. Benenson, Z., Cholewinski, P., Freiling, F.: Vulnerabilities and attacks in wireless sensor networks. Wireless Sensors Networks Security, 22–43 (2008)

    Google Scholar 

  8. Benenson, Z., Dewald, A., Freiling, F.: Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks. University of Mannheim, Technical Report (2009)

    Google Scholar 

  9. Carter, J.L., Wegman, M.N.: Universal classes of hash functions (extended abstract). In: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, STOC 1977, pp. 106–112. ACM, New York (1977)

    Chapter  Google Scholar 

  10. Lu, J., Liu, S., Wu, Q., Qiu, Q.: Accurate modelling and prediction of energy availability in energy harvesting real-time embedded systems. In: 2010 International Green Computing Conference, pp. 469–476 (2010)

    Google Scholar 

  11. Lupu, T.-G.: Main types of attacks in wireless sensor networks. In: Proceedings of the 9th WSEAS International Conference on Signal, Speech and Image Processing, and 9th WSEAS International Conference on Multimedia, Internet & Video Technologies, SSIP 2009/MIV 2009, Stevens Point, Wisconsin, USA, pp. 180–185. World Scientific and Engineering Academy and Society (WSEAS) (2009)

    Google Scholar 

  12. Martins, D., Guyennet, H.: Wireless sensor network attacks and security mechanisms: A short survey. In: 2010 13th International Conference on Network-Based Information Systems (NBiS), pp. 313–320 (2010)

    Google Scholar 

  13. Pelissier, S., Prabhakar, T., Jamadagni, H., Venkatesha Prasad, R., Niemegeers, I.: Providing security in energy harvesting sensor networks. In: Consumer Communications and Networking Conference (CCNC), pp. 452–456. IEEE (2011)

    Google Scholar 

  14. Sen, J.: A survey on wireless sensor network security. CoRR, abs/1011.1529 (2010)

    Google Scholar 

  15. Sudevalayam, S., Kulkarni, P.: Energy harvesting sensor nodes: Survey and implications. IEEE Communications Surveys Tutorials 13(3), 443–461 (2011)

    Article  Google Scholar 

  16. Taddeo, A.V., Mura, M., Ferrante, A.: Qos and security in energy-harvesting wireless sensor networks. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), pp. 1–10 (2010)

    Google Scholar 

  17. Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), pp. 324–328 (2005)

    Google Scholar 

  18. Won, D. (ed.): ICISC 2000. LNCS, vol. 2015. Springer, Heidelberg (2001)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Di Mauro, A., Papini, D., Vigo, R., Dragoni, N. (2012). Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30567-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30567-2_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30566-5

  • Online ISBN: 978-3-642-30567-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics