DocumentCode
2445089
Title
Security analysis of reliable transport layer protocols for wireless sensor networks
Author
Buttyan, Levente ; Csik, László
Author_Institution
Dept. of Telecommun., Budapest Univ. of Technol. & Econ., Budapest, Hungary
fYear
2010
fDate
March 29 2010-April 2 2010
Firstpage
419
Lastpage
424
Abstract
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols specifically designed for wireless sensor networks have been proposed in the literature. Besides providing end-to-end reliability, some of those protocols also address the problems of fairness and congestion control, and they are all optimized for low energy consumption. However, in this paper, we show that most of those protocols completely neglect security issues. As a consequence, they ensure reliable communications and low energy consumption only in a benign environment, but they fail in a hostile environment, where an adversary can forge or replay control packets of the protocol. More specifically, our analysis shows that control packet injection and replay can cause permanent loss of data packets, and thus, such misdeeds make the hitherto reliable protocol unreliable. In addition, even if the protocol can recover from such an attack, the recovery overhead caused by forged or replayed control packets can be large, which gives an opportunity for energy depletion attacks.
Keywords
telecommunication network reliability; telecommunication security; transport protocols; wireless sensor networks; control packet injection; end-to-end reliability; energy depletion attack; reliable transport layer protocol; security analysis; wireless sensor network; Base stations; Communication system control; Communication system security; Cryptographic protocols; Energy consumption; Laboratories; Telecommunication network reliability; Transport protocols; Wireless application protocol; Wireless sensor networks; dependability; reliability; security; transport protocols; wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2010 8th IEEE International Conference on
Conference_Location
Mannheim
Print_ISBN
978-1-4244-6605-4
Electronic_ISBN
978-1-4244-6606-1
Type
conf
DOI
10.1109/PERCOMW.2010.5470633
Filename
5470633
Link To Document