Team for Research in
Ubiquitous Secure Technology

Taxonomy of Security Attacks in Sensor Networks and
Tanya Roosta, Shiuhpyng Winston Shieh, Shankar Sastry

Citation
Tanya Roosta, Shiuhpyng Winston Shieh, Shankar Sastry. "Taxonomy of Security Attacks in Sensor Networks and". The First IEEE International Conference on System Integration and Reliability Improvements, December, 2006.

Abstract
Ad-hoc sensor networks have become common over the past few years and the domain of their application is increasing widely. However, the security of these networks poses a great challenge due to the fact that they consist of tiny wireless devices which have limited hardware and energy resources. In addition, these networks are generally deployed and then left unattended. These facts coupled together make it impractical to directly apply the traditional security mechanisms to the sensor network paradigm. Therefore, there is a need to analyze and better understand the security requirements of sensor networks. This paper provides a comprehensive taxonomy of security attacks on sensor networks, and gives solutions for each set of attacks. More importantly, it points out the research directions which need to be investigated in the future.

Electronic downloads

Citation formats  
  • HTML
    Tanya Roosta, Shiuhpyng Winston Shieh, Shankar Sastry. <a
    href="http://www.truststc.org/pubs/231.html"
    >Taxonomy of Security Attacks in Sensor Networks
    and</a>, The First IEEE International Conference on
    System Integration and Reliability Improvements, December,
    2006.
  • Plain text
    Tanya Roosta, Shiuhpyng Winston Shieh, Shankar Sastry.
    "Taxonomy of Security Attacks in Sensor Networks
    and". The First IEEE International Conference on System
    Integration and Reliability Improvements, December, 2006.
  • BibTeX
    @inproceedings{RoostaShiehSastry06_TaxonomyOfSecurityAttacksInSensorNetworks,
        author = {Tanya Roosta and Shiuhpyng Winston Shieh and
                  Shankar Sastry},
        title = {Taxonomy of Security Attacks in Sensor Networks and},
        booktitle = {The First IEEE International Conference on System
                  Integration and Reliability Improvements},
        month = {December},
        year = {2006},
        abstract = {Ad-hoc sensor networks have become common over the
                  past few years and the domain of their application
                  is increasing widely. However, the security of
                  these networks poses a great challenge due to the
                  fact that they consist of tiny wireless devices
                  which have limited hardware and energy resources.
                  In addition, these networks are generally deployed
                  and then left unattended. These facts coupled
                  together make it impractical to directly apply the
                  traditional security mechanisms to the sensor
                  network paradigm. Therefore, there is a need to
                  analyze and better understand the security
                  requirements of sensor networks. This paper
                  provides a comprehensive taxonomy of security
                  attacks on sensor networks, and gives solutions
                  for each set of attacks. More importantly, it
                  points out the research directions which need to
                  be investigated in the future.},
        URL = {http://www.truststc.org/pubs/231.html}
    }
    

Posted by Tanya Roosta on 22 Mar 2007.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.