A review of physical attacks and trusted platforms in Wireless Sensor Networks

Wireless Sensor Networks (WSNs) have shown great promise as the emerging technology for data gathering from unattended or hostile environment. The advancement in micro-electro-mechanical sensor technology, wireless communication technology and the recent energy scavenging have greatly contributed to...

Full description

Bibliographic Details
Published in:Procedia Engineering
Main Author: Yussoff Y.M.; Hashim H.; Rosli R.; Baba M.D.
Format: Conference paper
Language:English
Published: Elsevier Ltd 2012
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-84900332950&doi=10.1016%2fj.proeng.2012.07.215&partnerID=40&md5=29c6edf1b06d15fcb010a79a5356885d
id 2-s2.0-84900332950
spelling 2-s2.0-84900332950
Yussoff Y.M.; Hashim H.; Rosli R.; Baba M.D.
A review of physical attacks and trusted platforms in Wireless Sensor Networks
2012
Procedia Engineering
41

10.1016/j.proeng.2012.07.215
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84900332950&doi=10.1016%2fj.proeng.2012.07.215&partnerID=40&md5=29c6edf1b06d15fcb010a79a5356885d
Wireless Sensor Networks (WSNs) have shown great promise as the emerging technology for data gathering from unattended or hostile environment. The advancement in micro-electro-mechanical sensor technology, wireless communication technology and the recent energy scavenging have greatly contributed to the widespread acceptance of WSN related applications. In addtiion, the design of sensors that are small, low cost, low power and combined with its ability to be left unattended has made it more viable and indirectly promotes its popularity for future solutions in various real-life challenges. However, in sensor network, the nodes are physically accessible by adversaries and have been known to expose cryptographic materials such as the encryption keys and other important data in the sensor nodes. Acknowledging the severity of such attacks, this paper first presents the review on physical attacks followed by the introduction of trusted platform with protected memory that not only protect sensor node's sensitive credentials but also provide a concrete way to trust nodes in the dedicated wireless sensor network. Finally, summarization of proposed IBE-Trust framework is presented and briefly discussed. © 2012 The Authors.
Elsevier Ltd
18777058
English
Conference paper
All Open Access; Gold Open Access
author Yussoff Y.M.; Hashim H.; Rosli R.; Baba M.D.
spellingShingle Yussoff Y.M.; Hashim H.; Rosli R.; Baba M.D.
A review of physical attacks and trusted platforms in Wireless Sensor Networks
author_facet Yussoff Y.M.; Hashim H.; Rosli R.; Baba M.D.
author_sort Yussoff Y.M.; Hashim H.; Rosli R.; Baba M.D.
title A review of physical attacks and trusted platforms in Wireless Sensor Networks
title_short A review of physical attacks and trusted platforms in Wireless Sensor Networks
title_full A review of physical attacks and trusted platforms in Wireless Sensor Networks
title_fullStr A review of physical attacks and trusted platforms in Wireless Sensor Networks
title_full_unstemmed A review of physical attacks and trusted platforms in Wireless Sensor Networks
title_sort A review of physical attacks and trusted platforms in Wireless Sensor Networks
publishDate 2012
container_title Procedia Engineering
container_volume 41
container_issue
doi_str_mv 10.1016/j.proeng.2012.07.215
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-84900332950&doi=10.1016%2fj.proeng.2012.07.215&partnerID=40&md5=29c6edf1b06d15fcb010a79a5356885d
description Wireless Sensor Networks (WSNs) have shown great promise as the emerging technology for data gathering from unattended or hostile environment. The advancement in micro-electro-mechanical sensor technology, wireless communication technology and the recent energy scavenging have greatly contributed to the widespread acceptance of WSN related applications. In addtiion, the design of sensors that are small, low cost, low power and combined with its ability to be left unattended has made it more viable and indirectly promotes its popularity for future solutions in various real-life challenges. However, in sensor network, the nodes are physically accessible by adversaries and have been known to expose cryptographic materials such as the encryption keys and other important data in the sensor nodes. Acknowledging the severity of such attacks, this paper first presents the review on physical attacks followed by the introduction of trusted platform with protected memory that not only protect sensor node's sensitive credentials but also provide a concrete way to trust nodes in the dedicated wireless sensor network. Finally, summarization of proposed IBE-Trust framework is presented and briefly discussed. © 2012 The Authors.
publisher Elsevier Ltd
issn 18777058
language English
format Conference paper
accesstype All Open Access; Gold Open Access
record_format scopus
collection Scopus
_version_ 1809678162180702208