Sensor network hardware security
Wireless sensor networks are distributed networks consisting of many tiny sensor nodes with limited resources. These networks play an extremely important role in people’s modern lives. Despite their great application, one of the critical issues in their design and operation is the security of sensor...
Saved in:
Published in | AIP conference proceedings Vol. 2570; no. 1 |
---|---|
Main Author | |
Format | Journal Article Conference Proceeding |
Language | English |
Published |
Melville
American Institute of Physics
18.08.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Wireless sensor networks are distributed networks consisting of many tiny sensor nodes with limited resources. These networks play an extremely important role in people’s modern lives. Despite their great application, one of the critical issues in their design and operation is the security of sensor nodes, data, and entire network fragments. Security breaches through software attacks on sensor networks are currently the subject of much research by academia and the research community. Hardware Trojans (HTH) are malicious changes to hardware specifications during design or production in a way that alters the functionality of IC integrated circuits under conditions specified by the attacker. The discovery of HTH is a particularly difficult task in modern submicron technologies due to their intensive development. Our research shows that security threats and attacks based on hardware building sensor networks are real and not yet sufficiently studied, which is why this work focuses on the specifics of identifying this type of threat. The paper discusses and classifies hardware- specific hardware attacks. As a result of the study, some approaches to increase sensor networks’ hardware security have been identified and proposed. The results obtained in this work can be used to improve the means of protection of wireless sensor networks against various cyber-physical attacks. |
---|---|
AbstractList | Wireless sensor networks are distributed networks consisting of many tiny sensor nodes with limited resources. These networks play an extremely important role in people’s modern lives. Despite their great application, one of the critical issues in their design and operation is the security of sensor nodes, data, and entire network fragments. Security breaches through software attacks on sensor networks are currently the subject of much research by academia and the research community. Hardware Trojans (HTH) are malicious changes to hardware specifications during design or production in a way that alters the functionality of IC integrated circuits under conditions specified by the attacker. The discovery of HTH is a particularly difficult task in modern submicron technologies due to their intensive development. Our research shows that security threats and attacks based on hardware building sensor networks are real and not yet sufficiently studied, which is why this work focuses on the specifics of identifying this type of threat. The paper discusses and classifies hardware- specific hardware attacks. As a result of the study, some approaches to increase sensor networks’ hardware security have been identified and proposed. The results obtained in this work can be used to improve the means of protection of wireless sensor networks against various cyber-physical attacks. |
Author | Tsvetanov, Filip |
Author_xml | – sequence: 1 givenname: Filip surname: Tsvetanov fullname: Tsvetanov, Filip organization: South-West University, Blagoevgrad 2700, 56 Ivan Mihajlov Str. Bulgaria |
BookMark | eNp9kE1LxDAQhoOsYHf14D8oeBO65qOTpEdZ_IIFDyp4C2kzxa7a1CR12X9vZRe8eRoYnvcdnpmTWe97JOSc0SWjUlzBktKqAqaPSMYAWKEkkzOSTduy4KV4PSHzGDeU8kopnZH8CfvoQ95j2vrwnr_Z4LY2YB6xGUOXdqfkuLUfEc8Oc0Febm-eV_fF-vHuYXW9LgYmdSoUl3XNtXAcUFIERhtsaGUVr4SzXDdSamtraB22YAGwltYhc1IBqhpQLMjFvncI_mvEmMzGj6GfThquqJgsSqon6nJPxaZLNnW-N0PoPm3YmW8fDJiDvRlc-x_MqPl9119A_ABezV1b |
CODEN | APCPCS |
ContentType | Journal Article Conference Proceeding |
Copyright | Author(s) 2022 Author(s). Published by AIP Publishing. |
Copyright_xml | – notice: Author(s) – notice: 2022 Author(s). Published by AIP Publishing. |
DBID | 8FD H8D L7M |
DOI | 10.1063/5.0099518 |
DatabaseName | Technology Research Database Aerospace Database Advanced Technologies Database with Aerospace |
DatabaseTitle | Technology Research Database Aerospace Database Advanced Technologies Database with Aerospace |
DatabaseTitleList | Technology Research Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Physics |
EISSN | 1551-7616 |
Editor | Filjar, Renato Iliev, Iliya |
Editor_xml | – sequence: 1 givenname: Renato surname: Filjar fullname: Filjar, Renato organization: Krapina University of Applied Sciences – sequence: 2 givenname: Iliya surname: Iliev fullname: Iliev, Iliya organization: University of Ruse |
ExternalDocumentID | acp |
Genre | Conference Proceeding |
GroupedDBID | -~X 23M 5GY AAAAW AABDS AAEUA AAPUP AAYIH ABJNI ACBRY ACZLF ADCTM AEJMO AFATG AFHCQ AGKCL AGLKD AGMXG AGTJO AHSDT AJJCW ALEPV ALMA_UNASSIGNED_HOLDINGS ATXIE AWQPM BPZLN F5P FDOHQ FFFMQ HAM M71 M73 RIP RQS SJN ~02 8FD ABJGX ADMLS H8D L7M |
ID | FETCH-LOGICAL-p168t-726bb283d25e60e510cec09a7293da28c668aab5fdef5a55eb6ade1d675e7b5e3 |
ISSN | 0094-243X |
IngestDate | Mon Jun 30 07:16:31 EDT 2025 Fri Jun 21 00:30:09 EDT 2024 Tue Jul 04 19:18:46 EDT 2023 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
License | 0094-243X/2022/2570/020019/9/$30.00 Published by AIP Publishing. |
LinkModel | OpenURL |
MeetingName | INTERNATIONAL SCIENTIFIC CONFERENCE ON COMMUNICATIONS, INFORMATION, ELECTRONIC AND ENERGY SYSTEMS – CIEES 2021 |
MergedId | FETCHMERGED-LOGICAL-p168t-726bb283d25e60e510cec09a7293da28c668aab5fdef5a55eb6ade1d675e7b5e3 |
Notes | ObjectType-Conference Proceeding-1 SourceType-Conference Papers & Proceedings-1 content type line 21 |
PQID | 2703616408 |
PQPubID | 2050672 |
PageCount | 9 |
ParticipantIDs | scitation_primary_10_1063_5_0099518 proquest_journals_2703616408 |
PublicationCentury | 2000 |
PublicationDate | 20220818 |
PublicationDateYYYYMMDD | 2022-08-18 |
PublicationDate_xml | – month: 08 year: 2022 text: 20220818 day: 18 |
PublicationDecade | 2020 |
PublicationPlace | Melville |
PublicationPlace_xml | – name: Melville |
PublicationTitle | AIP conference proceedings |
PublicationYear | 2022 |
Publisher | American Institute of Physics |
Publisher_xml | – name: American Institute of Physics |
References | Venugopalan, Patterson (c12) 2018 Alam, De (c6) 2014 Perrig, Stankovic, Wagner (c3) 2004 Vishal (c17) 2011 Sabeel, Maqbool (c5) 2013 |
References_xml | – year: 2014 ident: c6 article-title: Analysis of security threats in wireless sensor network – start-page: 53 year: 2004 ident: c3 article-title: Security in wireless sensor networks – start-page: 131 year: 2018 ident: c12 article-title: Surveying the hardware trojan threat landscape for the Internet-of- Things – start-page: 35 year: 2011 ident: c17 article-title: Security in Wireless Sensor Network: A survey – start-page: 19 year: 2013 ident: c5 article-title: Categorized Security Threats in the Wireless Sensor, Networks: Countermeasures and Security Management Schemes |
SSID | ssj0029778 |
Score | 2.2954671 |
Snippet | Wireless sensor networks are distributed networks consisting of many tiny sensor nodes with limited resources. These networks play an extremely important role... |
SourceID | proquest scitation |
SourceType | Aggregation Database Enrichment Source Publisher |
SubjectTerms | Computer networks Hardware Integrated circuits Nodes Sensors Wireless networks Wireless sensor networks |
Title | Sensor network hardware security |
URI | http://dx.doi.org/10.1063/5.0099518 https://www.proquest.com/docview/2703616408 |
Volume | 2570 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fS8MwEA66IfrmT5xOKejbiG5Nk6aPQx0q8wfYwd5Cm14f17HNCf71Xta03XQI-lJKCd36XXr3fendhZDLVHOmpe_RGMM79RKf0QB0SkWCZFaCH7u-KU5-ehb3A-9xyIdVy99FdcksvtKfa-tK_mNVvIZ2NVWyf7BseVO8gOdoXzyihfH408ZrQ0334dUkjhfNYqsx0-W58IZaNZu0RnnKd8sUWn2YjK-p3byulO_TOSBZzOatnllmWV4RQDFpOrTKyobFp56VdINFQqleXgBEYUddb7EbL0YC6_54h_oir34s_KPZ5-77TPjheJHpIFpmfSpAziar6FJ8UX9-Ub1Bv6_Cu2G4Seou8yWvkXr39qn_VipkJKN56LR_rWgFJdh1eesVKbCNPCFPWVhiBeEuOazqJZ3XEvo9sgGjfbJlsTggTo6_Y_F3CvydAv9DMujdhTf31O5MQccdIWfUd0UcIzFLXA6iDejXNOh2EKFSYUnkSi2EjKKYpwmkPOIcYhEl0ElQneH058COSG2UjeCYOJHmHF-MgAEScQAvCtDHSo_pQKYgJW-QZvG4yk69qXJN2zQUum3ZIBclBGqcNyhRi8QCwRRXFrO1o-bZpBqhxkl68vtPnZIdZIs8z5Nrktps8g5nyMhm8bm14xd4tTnj |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=AIP+conference+proceedings&rft.atitle=Sensor+network+hardware+security&rft.au=Tsvetanov+Filip&rft.date=2022-08-18&rft.pub=American+Institute+of+Physics&rft.issn=0094-243X&rft.eissn=1551-7616&rft.volume=2570&rft.issue=1&rft_id=info:doi/10.1063%2F5.0099518&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0094-243X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0094-243X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0094-243X&client=summon |