Node compromise in sensor networks: the need for secure systems

Carl Hartung, James Balasalle, Richard Han

Research output: Book/ReportOther report

Abstract

While sensor network deployment is becoming more commonplace in environmental, business, and military applications, security of these networks emerges as a critical concern. Without proper security, it is impossible to completely trust the results reported from sensor networks deployed outside of controlled environments.

Much of the current research in sensor networks has focused on protocols and authentication schemes for protecting the transport of information. However, all of those schemes are useless if an attacker can obtain a node from the network and extract the appropriate information, such as security, from it.

We focus our research on the area of secure systems. In this paper we demonstrate the ease with which nodes can be compromised as well as show exactly what information can be obtained and how it can be used to disrupt, falsify data within, or eavesdrop on sensor networks. We then suggest mechanisms to detect intrusions into individual sensor nodes. Finally, we come up with security measures that can be implemented in future generation nodes to improve security.
Original languageEnglish
Place of PublicationBoulder, CO
PublisherUniversity of Colorado at Boulder
Number of pages8
Publication statusPublished - 1 Jan 2005
Externally publishedYes

Fingerprint

Dive into the research topics of 'Node compromise in sensor networks: the need for secure systems'. Together they form a unique fingerprint.

Cite this