Abstract
What are the real security issues of wireless communication and wireless sensor networks in particular? Despite predictions of wireless sensor networks being deployed in many aspects of everyday life, real world deployments are still quite sparse. It seems that monitoring of large civil engineering structures is one of the few applications where wireless sensor networks may give enough value for the necessary investment. The least, several companies managing large civil structures in the UK are keen on investigating the potential of wireless sensor networks.
In the light of this technology, which is built on a new paradigm of dense wireless communication networks, we can see new security challenges never experienced by engineers before. Can we appreciate the difference between wire and wireless communication and also the difference between centralised wireless networks, e.g., WiFi and largely decentralised sensor networks? We show how the shift in the technology introduces new problems that need to be solved to provide secure communication systems. The second part of the paper details particular attacks that work against current implementations of wireless sensor networks and routing, traffic analysis, and cryptography in particular.
The paper is based on the work carried out with Frank Stajano and Matt Lewis as part of the EPSRC WINES Infrastructures project at the University of Cambridge, UK.
Chapter PDF
Similar content being viewed by others
Keywords
- Sensor Network
- Wireless Sensor Network
- Wireless Communication
- Communication Range
- Base Transceiver Station
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12), 993–999 (1978)
Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of a5/1 on a pc. In: FSE: Fast Software Encryption, pp. 1–18. Springer, Heidelberg (2000)
Barkan, E., Biham, E., Keller, N.: Instant ciphertext-only cryptanalysis of gsm encrypted communication. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 600–616. Springer, Heidelberg (2003)
Hancke, G.P.: Practical attacks on proximity identification systems (short paper). In: IEEE Symposium on Security and Privacy, pp. 328–333. IEEE, Los Alamitos (2006)
Hancke, G.P., Kuhn, M.G.: Attacks on time-of-flight distance bounding channels. In: WISEC, pp. 194–202 (2008)
Cheung, H.: How to: Building a bluesniper rifle (2005), http://www.tomsguide.com/us/how-to-bluesniper-pt1,review-408.html
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002, Washington, DC, USA, pp. 41–47 (2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: SP 2003, Washington, DC, USA, pp. 197–214 (2003)
Pietro, R.D., Mancini, L.V., Mei, A.: Random key-assignment for secure wireless sensor networks. In: 1st ACM Workshop Security of Ad Hoc and Sensor Networks Fairfax, Virginia, pp. 62–71 (2003)
Crossbow: Stargate developer’s guide (2004)
Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: Proc. 2nd SenSys., pp. 162–175 (2004)
Wood, A.D., Stankovic, J.A., Zhou, G.: Deejam: Defeating energy-efficient jamming in ieee 802.15.4-based wireless networks. In: Proc. 4th IEEE SECON, pp. 60–69. IEEE, Los Alamitos (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Cvrček, D. (2009). Security of Wireless Communication. In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds) The Future of Identity in the Information Society. Privacy and Identity 2008. IFIP Advances in Information and Communication Technology, vol 298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03315-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-03315-5_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03314-8
Online ISBN: 978-3-642-03315-5
eBook Packages: Computer ScienceComputer Science (R0)