Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks

Alessio Di Mauro, Davide Papini, Roberto Vigo, Nicola Dragoni

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    Security is a crucial matter for Wireless Sensor Networks. With the recent introduction of Energy-Harvesting nodes, it has gained even more importance. By exploiting the ability of scavenging energy from the surrounding environment, the lifespan of a node has drastically increased. This is one of the reasons why security needs a new take in this topic. Traditional solutions may not work in this new domain. Brand new challenges and threats may arise and new solutions have to be designed. In this paper we present a first taxonomy of attacks, focusing on how they change in the energy-harvesting context compared to regular sensor networks. We also discuss existing security solutions specific for the energy harvesting world and comment on the trend that this topic may follow in the future. Finally, we draw a comparison between the cyber-physical attacker we define in our model and adversary models belonging to security protocols verification literature.
    Original languageEnglish
    Title of host publicationNetworked Digital Technologies : 4th International Conference, NDT 2012 Dubai, UAE, April 24-26, 2012 Proceedings, Part II
    PublisherSpringer
    Publication date2012
    Pages289-301
    ISBN (Print)978-3-642-30566-5
    ISBN (Electronic)978-3-642-30567-2
    DOIs
    Publication statusPublished - 2012
    Event4th International Conference on Networked Digital Technologies (NDT 2012) - Canadian University of Dubai, Dubai, United Arab Emirates
    Duration: 24 Apr 201226 Apr 2012
    http://www.ndtconf.org/

    Conference

    Conference4th International Conference on Networked Digital Technologies (NDT 2012)
    LocationCanadian University of Dubai
    CountryUnited Arab Emirates
    CityDubai
    Period24/04/201226/04/2012
    Internet address
    SeriesCommunications in Computer and Information Science
    Volume294
    ISSN1865-0929

    Fingerprint Dive into the research topics of 'Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks'. Together they form a unique fingerprint.

    Cite this