About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Mobile Lightweight Wireless Systems. Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers

Research Article

Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks

Download(Requires a free EAI acccount)
527 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-16644-0_21,
        author={Giacomo Meulenaer and Fran\`{e}ois-Xavier Standaert},
        title={Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks},
        proceedings={Mobile Lightweight Wireless Systems. Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers},
        proceedings_a={MOBILIGHT},
        year={2012},
        month={10},
        keywords={Wireless Sensor Networks Node Compromise Power Analysis Attacks},
        doi={10.1007/978-3-642-16644-0_21}
    }
    
  • Giacomo Meulenaer
    François-Xavier Standaert
    Year: 2012
    Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
    MOBILIGHT
    Springer
    DOI: 10.1007/978-3-642-16644-0_21
Giacomo Meulenaer1,*, François-Xavier Standaert1,*
  • 1: UCL Crypto Group
*Contact email: giacomo.demeulenaer@uclouvain.be, fstandae@uclouvain.be

Abstract

Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of events that arise during the attack such as the removal of a node for instance. However, certain attacks, such as side-channel attacks, might be furtive and defeat this type of defense. This work clarifies this question by performing a case study of power analysis attacks on AES and ECC implementations on two common types of nodes: the MICAz and the TelosB. From our experiments, the attacks can be carried out in a stealthy manner. As a result, stealthy node compromises should be considered when securing wireless sensor networks. Also, the moderate complexity of our attacks underlines the importance of low-cost side-channel countermeasures for sensor nodes.

Keywords
Wireless Sensor Networks Node Compromise Power Analysis Attacks
Published
2012-10-17
http://dx.doi.org/10.1007/978-3-642-16644-0_21
Copyright © 2010–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL