Attacker Models for Wireless Sensor Networks

Zinaida Benenson, Erik-Oliver Blaß 1 ,  and Felix C. Freiling 2
  • 1  EURECOM, Sophia Antipolis, Frankreich
  • 2  University of Mannheim, Institut für Informatik, Mannheim

Abstract

Assumptions about attackers critically influence security and efficiency of protocols. Without precisely defined attacker models, proving security of protocols becomes impossible. Especially the area of sensor network security lacks well-established and precise attacker models. We present a general framework for attacker models in wireless sensor networks that structures and orders typical assumptions about attackers.

Purchase article
Get instant unlimited access to the article.
$42.00
Log in
Already have access? Please log in.


or
Log in with your institution

Journal + Issues

it - Information Technology is a strictly peer-reviewed scientific journal. It is the oldest German journal in the field of information technology. Today, the major aim of it - Information Technology is highlighting issues on ongoing newsworthy areas in information technology and informatics and their application. It aims at presenting the topics with a holistic view.

Search