A review of physical attacks and trusted platforms in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have shown great promise as the emerging technology for data gathering from unattended or hostile environment. The advancement in micro-electro-mechanical sensor technology, wireless communication technology and the recent energy scavenging have greatly contributed to...
Published in: | Procedia Engineering |
---|---|
Main Author: | |
Format: | Conference paper |
Language: | English |
Published: |
Elsevier Ltd
2012
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84900332950&doi=10.1016%2fj.proeng.2012.07.215&partnerID=40&md5=29c6edf1b06d15fcb010a79a5356885d |
id |
2-s2.0-84900332950 |
---|---|
spelling |
2-s2.0-84900332950 Yussoff Y.M.; Hashim H.; Rosli R.; Baba M.D. A review of physical attacks and trusted platforms in Wireless Sensor Networks 2012 Procedia Engineering 41 10.1016/j.proeng.2012.07.215 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84900332950&doi=10.1016%2fj.proeng.2012.07.215&partnerID=40&md5=29c6edf1b06d15fcb010a79a5356885d Wireless Sensor Networks (WSNs) have shown great promise as the emerging technology for data gathering from unattended or hostile environment. The advancement in micro-electro-mechanical sensor technology, wireless communication technology and the recent energy scavenging have greatly contributed to the widespread acceptance of WSN related applications. In addtiion, the design of sensors that are small, low cost, low power and combined with its ability to be left unattended has made it more viable and indirectly promotes its popularity for future solutions in various real-life challenges. However, in sensor network, the nodes are physically accessible by adversaries and have been known to expose cryptographic materials such as the encryption keys and other important data in the sensor nodes. Acknowledging the severity of such attacks, this paper first presents the review on physical attacks followed by the introduction of trusted platform with protected memory that not only protect sensor node's sensitive credentials but also provide a concrete way to trust nodes in the dedicated wireless sensor network. Finally, summarization of proposed IBE-Trust framework is presented and briefly discussed. © 2012 The Authors. Elsevier Ltd 18777058 English Conference paper All Open Access; Gold Open Access |
author |
Yussoff Y.M.; Hashim H.; Rosli R.; Baba M.D. |
spellingShingle |
Yussoff Y.M.; Hashim H.; Rosli R.; Baba M.D. A review of physical attacks and trusted platforms in Wireless Sensor Networks |
author_facet |
Yussoff Y.M.; Hashim H.; Rosli R.; Baba M.D. |
author_sort |
Yussoff Y.M.; Hashim H.; Rosli R.; Baba M.D. |
title |
A review of physical attacks and trusted platforms in Wireless Sensor Networks |
title_short |
A review of physical attacks and trusted platforms in Wireless Sensor Networks |
title_full |
A review of physical attacks and trusted platforms in Wireless Sensor Networks |
title_fullStr |
A review of physical attacks and trusted platforms in Wireless Sensor Networks |
title_full_unstemmed |
A review of physical attacks and trusted platforms in Wireless Sensor Networks |
title_sort |
A review of physical attacks and trusted platforms in Wireless Sensor Networks |
publishDate |
2012 |
container_title |
Procedia Engineering |
container_volume |
41 |
container_issue |
|
doi_str_mv |
10.1016/j.proeng.2012.07.215 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84900332950&doi=10.1016%2fj.proeng.2012.07.215&partnerID=40&md5=29c6edf1b06d15fcb010a79a5356885d |
description |
Wireless Sensor Networks (WSNs) have shown great promise as the emerging technology for data gathering from unattended or hostile environment. The advancement in micro-electro-mechanical sensor technology, wireless communication technology and the recent energy scavenging have greatly contributed to the widespread acceptance of WSN related applications. In addtiion, the design of sensors that are small, low cost, low power and combined with its ability to be left unattended has made it more viable and indirectly promotes its popularity for future solutions in various real-life challenges. However, in sensor network, the nodes are physically accessible by adversaries and have been known to expose cryptographic materials such as the encryption keys and other important data in the sensor nodes. Acknowledging the severity of such attacks, this paper first presents the review on physical attacks followed by the introduction of trusted platform with protected memory that not only protect sensor node's sensitive credentials but also provide a concrete way to trust nodes in the dedicated wireless sensor network. Finally, summarization of proposed IBE-Trust framework is presented and briefly discussed. © 2012 The Authors. |
publisher |
Elsevier Ltd |
issn |
18777058 |
language |
English |
format |
Conference paper |
accesstype |
All Open Access; Gold Open Access |
record_format |
scopus |
collection |
Scopus |
_version_ |
1809678162180702208 |