Security analysis of reliable transport layer protocols for wireless sensor networks

Levente Buttyán, László Csik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Abstract

End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols specifically designed for wireless sensor networks have been proposed in the literature. Besides providing end-to-end reliability, some of those protocols also address the problems of fairness and congestion control, and they are all optimized for low energy consumption. However, in this paper, we show that most of those protocols completely neglect security issues. As a consequence, they ensure reliable communications and low energy consumption only in a benign environment, but they fail in a hostile environment, where an adversary can forge or replay control packets of the protocol. More specifically, our analysis shows that control packet injection and replay can cause permanent loss of data packets, and thus, such misdeeds make the hitherto reliable protocol unreliable. In addition, even if the protocol can recover from such an attack, the recovery overhead caused by forged or replayed control packets can be large, which gives an opportunity for energy depletion attacks.

Original languageEnglish
Title of host publication2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010
Pages419-424
Number of pages6
DOIs
Publication statusPublished - Jul 1 2010
Event2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010 - Mannheim, Germany
Duration: Mar 29 2010Apr 2 2010

Publication series

Name2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010

Other

Other2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010
CountryGermany
CityMannheim
Period3/29/104/2/10

Keywords

  • Dependability
  • Reliability
  • Security
  • Transport protocols
  • Wireless sensor networks

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Software
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'Security analysis of reliable transport layer protocols for wireless sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Buttyán, L., & Csik, L. (2010). Security analysis of reliable transport layer protocols for wireless sensor networks. In 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010 (pp. 419-424). [5470633] (2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010). https://doi.org/10.1109/PERCOMW.2010.5470633