Cryptography Reference
In-Depth Information
2.4 Summary
Although WSN are a subclass of wireless networks, due to the resource-constrained
nature of WSN, they breed a whole new set of attacks. In this chapter, we introduced
the attack taxonomy for WSN and discussed various kinds of attacks on such net-
works. Countermeasures to these attacks were discussed from a layered perspective of
the WSN stack.
2.5 References
Anand, M., Z. G. Ives, and I. Lee. Quantifying eavesdropping vulnerability in sensor net-
works. Departmental papers, Department of Computer & Information Science, University
of Pennsylvania, 2005.
Douceur, J. R. The sybil attack. First International Workshop on Peer-to-Peer Systems (IPTPS
'02). 2002.
Healy, M., T. Newe, and E. Lewis. Security for wireless sensor networks: A review. SAS 2009—
IEEE Sensors Applications Symposium. IEEE, 2009, 80-85.
Karlof, C., and D. Wagner. Secure routing in wireless sensor networks: Attacks and counter-
measures. First International Workshop on Sensor Network Protocols and Applications. IEEE,
2003, 113-127.
Karlof, C., N. Sastry, and D. Wagner. TinySec: A link layer security architecture for wireless
sensor networks. Second ACM Conference on Embedded Networked Sensor Systems. ACM,
2004, 162-175.
Newsome, J., E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: Analysis &
defenses. Third International Symposium on Information Processing in Sensor Networks, IPSN.
IEEE, 2004, 259-268.
Perrig, A., R. Szewczyk, J. Tygar, V. Wen, and D. Culler. SPINS: Security protocols for sensors.
Wireless Networks 8, no. 5 (2002): 521-534.
Perrig, A., J. Stankovic, and D. Wagner. Security in wireless sensor networks. Communications
of the ACM 47, no. 6 (June 2004): 53-57.
Sun, Z., X.-G. Zhang, H. Li, and A. Li. The application of TinyOS beaconing WSN routing
protocol in mine safety monitoring. International Conference on Mechtronic and Embedded
Systems and Applications, MESA. IEEE, 2008, 415-419.
Xu, W., W. Trappe, Y. Zhang, and T Wood. Proceedings of the Sixth ACM International
Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05). ACM, 2005, 48-57.
Xu, W., W. Trappe, and Y. Zhang. Defending wireless sensor networks from radio interference
through channel adaptation. ACM Transactions on Sensor Networks, 4, no. 4 (August 2008).
Search WWH ::




Custom Search