KEYWORDS: Receivers, Sensor networks, Sensors, Information security, Received signal strength, Network security, Databases, Computer security, Defense and security, Distance measurement
With the advent of powerful and efficient wireless sensor nodes, the usage of wireless sensor networks (WSNs) has been
greatly increased. However, various kinds of security breaches have also been introduced, which exposes the
vulnerability of these nodes to defend the valuable data from some specific types of attacks. In this paper, we address
node replication, replacement, and man-in-the-middle attacks. We analyze the feasibility of using received signal
strength indicator (RSSI) values measured at the receiver node to detect these kinds of attacks. As RSSI value is readily
available for every message received by a node, a successful utilization of this information in security breach detection
can be a very important contribution.
There are various uses of wireless sensor technology, ranging from medical, to environmental, to military. One possible
usage is home security. A wireless sensor network could be used to detect the presence of an intruder. We have
investigated the use of Received Signal Strength Indicator (RSSI) values to determine the mobility of an intruder and
have found that accurate intruder detection is possible for at least short distances (up to 20 feet). The results of
interference monitoring show that a wireless sensor network could be a feasible alternative for security and surveillance
of homes.
Conference Committee Involvement (1)
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.