Title :
Attacks with Steganography in PHY and MAC Layers of 802.15.4 Protocol
Author :
Martins, David ; GUyennet, Hervé
Author_Institution :
Comput. Sci. Dept. LIFC, Univ. of Franche-Comte, Besançon, France
Abstract :
Wireless sensor networks are threatened by numerous attacks. Therefore, security is now becoming an important new path of research and attempts to counter these attacks. However, even if research finds solutions to counter known attacks, we show in this article that there is a threat in wireless sensor networks by using the 802.15.4 protocol. It is possible to hide data in PHY and MAC layers with steganographic techniques. In this article, we explain what steganography is, how we can use it in the layers of 802.15.4 protocol, how an attacker can do an attack and what we can do to detect this kind of threat.
Keywords :
access protocols; steganography; wireless sensor networks; 802.15.4 protocol; MAC Layers; PHY layers; steganographic techniques; steganography; wireless sensor networks; Cryptography; Media Access Protocol; Monitoring; Watermarking; Wireless sensor networks; 802.15.4 protocol; MAC layer; security; steganography; wireless sensor networks;
Conference_Titel :
Systems and Networks Communications (ICSNC), 2010 Fifth International Conference on
Conference_Location :
Nice
Print_ISBN :
978-1-4244-7789-0
Electronic_ISBN :
978-0-7695-4145-7
DOI :
10.1109/ICSNC.2010.11