Sensor network hardware security

Wireless sensor networks are distributed networks consisting of many tiny sensor nodes with limited resources. These networks play an extremely important role in people’s modern lives. Despite their great application, one of the critical issues in their design and operation is the security of sensor...

Full description

Saved in:
Bibliographic Details
Published inAIP conference proceedings Vol. 2570; no. 1
Main Author Tsvetanov, Filip
Format Journal Article Conference Proceeding
LanguageEnglish
Published Melville American Institute of Physics 18.08.2022
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Wireless sensor networks are distributed networks consisting of many tiny sensor nodes with limited resources. These networks play an extremely important role in people’s modern lives. Despite their great application, one of the critical issues in their design and operation is the security of sensor nodes, data, and entire network fragments. Security breaches through software attacks on sensor networks are currently the subject of much research by academia and the research community. Hardware Trojans (HTH) are malicious changes to hardware specifications during design or production in a way that alters the functionality of IC integrated circuits under conditions specified by the attacker. The discovery of HTH is a particularly difficult task in modern submicron technologies due to their intensive development. Our research shows that security threats and attacks based on hardware building sensor networks are real and not yet sufficiently studied, which is why this work focuses on the specifics of identifying this type of threat. The paper discusses and classifies hardware- specific hardware attacks. As a result of the study, some approaches to increase sensor networks’ hardware security have been identified and proposed. The results obtained in this work can be used to improve the means of protection of wireless sensor networks against various cyber-physical attacks.
AbstractList Wireless sensor networks are distributed networks consisting of many tiny sensor nodes with limited resources. These networks play an extremely important role in people’s modern lives. Despite their great application, one of the critical issues in their design and operation is the security of sensor nodes, data, and entire network fragments. Security breaches through software attacks on sensor networks are currently the subject of much research by academia and the research community. Hardware Trojans (HTH) are malicious changes to hardware specifications during design or production in a way that alters the functionality of IC integrated circuits under conditions specified by the attacker. The discovery of HTH is a particularly difficult task in modern submicron technologies due to their intensive development. Our research shows that security threats and attacks based on hardware building sensor networks are real and not yet sufficiently studied, which is why this work focuses on the specifics of identifying this type of threat. The paper discusses and classifies hardware- specific hardware attacks. As a result of the study, some approaches to increase sensor networks’ hardware security have been identified and proposed. The results obtained in this work can be used to improve the means of protection of wireless sensor networks against various cyber-physical attacks.
Author Tsvetanov, Filip
Author_xml – sequence: 1
  givenname: Filip
  surname: Tsvetanov
  fullname: Tsvetanov, Filip
  organization: South-West University, Blagoevgrad 2700, 56 Ivan Mihajlov Str. Bulgaria
BookMark eNp9kE1LxDAQhoOsYHf14D8oeBO65qOTpEdZ_IIFDyp4C2kzxa7a1CR12X9vZRe8eRoYnvcdnpmTWe97JOSc0SWjUlzBktKqAqaPSMYAWKEkkzOSTduy4KV4PSHzGDeU8kopnZH8CfvoQ95j2vrwnr_Z4LY2YB6xGUOXdqfkuLUfEc8Oc0Febm-eV_fF-vHuYXW9LgYmdSoUl3XNtXAcUFIERhtsaGUVr4SzXDdSamtraB22YAGwltYhc1IBqhpQLMjFvncI_mvEmMzGj6GfThquqJgsSqon6nJPxaZLNnW-N0PoPm3YmW8fDJiDvRlc-x_MqPl9119A_ABezV1b
CODEN APCPCS
ContentType Journal Article
Conference Proceeding
Copyright Author(s)
2022 Author(s). Published by AIP Publishing.
Copyright_xml – notice: Author(s)
– notice: 2022 Author(s). Published by AIP Publishing.
DBID 8FD
H8D
L7M
DOI 10.1063/5.0099518
DatabaseName Technology Research Database
Aerospace Database
Advanced Technologies Database with Aerospace
DatabaseTitle Technology Research Database
Aerospace Database
Advanced Technologies Database with Aerospace
DatabaseTitleList Technology Research Database

DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 1551-7616
Editor Filjar, Renato
Iliev, Iliya
Editor_xml – sequence: 1
  givenname: Renato
  surname: Filjar
  fullname: Filjar, Renato
  organization: Krapina University of Applied Sciences
– sequence: 2
  givenname: Iliya
  surname: Iliev
  fullname: Iliev, Iliya
  organization: University of Ruse
ExternalDocumentID acp
Genre Conference Proceeding
GroupedDBID -~X
23M
5GY
AAAAW
AABDS
AAEUA
AAPUP
AAYIH
ABJNI
ACBRY
ACZLF
ADCTM
AEJMO
AFATG
AFHCQ
AGKCL
AGLKD
AGMXG
AGTJO
AHSDT
AJJCW
ALEPV
ALMA_UNASSIGNED_HOLDINGS
ATXIE
AWQPM
BPZLN
F5P
FDOHQ
FFFMQ
HAM
M71
M73
RIP
RQS
SJN
~02
8FD
ABJGX
ADMLS
H8D
L7M
ID FETCH-LOGICAL-p168t-726bb283d25e60e510cec09a7293da28c668aab5fdef5a55eb6ade1d675e7b5e3
ISSN 0094-243X
IngestDate Mon Jun 30 07:16:31 EDT 2025
Fri Jun 21 00:30:09 EDT 2024
Tue Jul 04 19:18:46 EDT 2023
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License 0094-243X/2022/2570/020019/9/$30.00
Published by AIP Publishing.
LinkModel OpenURL
MeetingName INTERNATIONAL SCIENTIFIC CONFERENCE ON COMMUNICATIONS, INFORMATION, ELECTRONIC AND ENERGY SYSTEMS – CIEES 2021
MergedId FETCHMERGED-LOGICAL-p168t-726bb283d25e60e510cec09a7293da28c668aab5fdef5a55eb6ade1d675e7b5e3
Notes ObjectType-Conference Proceeding-1
SourceType-Conference Papers & Proceedings-1
content type line 21
PQID 2703616408
PQPubID 2050672
PageCount 9
ParticipantIDs scitation_primary_10_1063_5_0099518
proquest_journals_2703616408
PublicationCentury 2000
PublicationDate 20220818
PublicationDateYYYYMMDD 2022-08-18
PublicationDate_xml – month: 08
  year: 2022
  text: 20220818
  day: 18
PublicationDecade 2020
PublicationPlace Melville
PublicationPlace_xml – name: Melville
PublicationTitle AIP conference proceedings
PublicationYear 2022
Publisher American Institute of Physics
Publisher_xml – name: American Institute of Physics
References Venugopalan, Patterson (c12) 2018
Alam, De (c6) 2014
Perrig, Stankovic, Wagner (c3) 2004
Vishal (c17) 2011
Sabeel, Maqbool (c5) 2013
References_xml – year: 2014
  ident: c6
  article-title: Analysis of security threats in wireless sensor network
– start-page: 53
  year: 2004
  ident: c3
  article-title: Security in wireless sensor networks
– start-page: 131
  year: 2018
  ident: c12
  article-title: Surveying the hardware trojan threat landscape for the Internet-of- Things
– start-page: 35
  year: 2011
  ident: c17
  article-title: Security in Wireless Sensor Network: A survey
– start-page: 19
  year: 2013
  ident: c5
  article-title: Categorized Security Threats in the Wireless Sensor, Networks: Countermeasures and Security Management Schemes
SSID ssj0029778
Score 2.2954671
Snippet Wireless sensor networks are distributed networks consisting of many tiny sensor nodes with limited resources. These networks play an extremely important role...
SourceID proquest
scitation
SourceType Aggregation Database
Enrichment Source
Publisher
SubjectTerms Computer networks
Hardware
Integrated circuits
Nodes
Sensors
Wireless networks
Wireless sensor networks
Title Sensor network hardware security
URI http://dx.doi.org/10.1063/5.0099518
https://www.proquest.com/docview/2703616408
Volume 2570
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fS8MwEA66IfrmT5xOKejbiG5Nk6aPQx0q8wfYwd5Cm14f17HNCf71Xta03XQI-lJKCd36XXr3fendhZDLVHOmpe_RGMM79RKf0QB0SkWCZFaCH7u-KU5-ehb3A-9xyIdVy99FdcksvtKfa-tK_mNVvIZ2NVWyf7BseVO8gOdoXzyihfH408ZrQ0334dUkjhfNYqsx0-W58IZaNZu0RnnKd8sUWn2YjK-p3byulO_TOSBZzOatnllmWV4RQDFpOrTKyobFp56VdINFQqleXgBEYUddb7EbL0YC6_54h_oir34s_KPZ5-77TPjheJHpIFpmfSpAziar6FJ8UX9-Ub1Bv6_Cu2G4Seou8yWvkXr39qn_VipkJKN56LR_rWgFJdh1eesVKbCNPCFPWVhiBeEuOazqJZ3XEvo9sgGjfbJlsTggTo6_Y_F3CvydAv9DMujdhTf31O5MQccdIWfUd0UcIzFLXA6iDejXNOh2EKFSYUnkSi2EjKKYpwmkPOIcYhEl0ElQneH058COSG2UjeCYOJHmHF-MgAEScQAvCtDHSo_pQKYgJW-QZvG4yk69qXJN2zQUum3ZIBclBGqcNyhRi8QCwRRXFrO1o-bZpBqhxkl68vtPnZIdZIs8z5Nrktps8g5nyMhm8bm14xd4tTnj
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=AIP+conference+proceedings&rft.atitle=Sensor+network+hardware+security&rft.au=Tsvetanov+Filip&rft.date=2022-08-18&rft.pub=American+Institute+of+Physics&rft.issn=0094-243X&rft.eissn=1551-7616&rft.volume=2570&rft.issue=1&rft_id=info:doi/10.1063%2F5.0099518&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0094-243X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0094-243X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0094-243X&client=summon