• DocumentCode
    3071663
  • Title

    Attacks with Steganography in PHY and MAC Layers of 802.15.4 Protocol

  • Author

    Martins, David ; GUyennet, Hervé

  • Author_Institution
    Comput. Sci. Dept. LIFC, Univ. of Franche-Comte, Besançon, France
  • fYear
    2010
  • fDate
    22-27 Aug. 2010
  • Firstpage
    31
  • Lastpage
    36
  • Abstract
    Wireless sensor networks are threatened by numerous attacks. Therefore, security is now becoming an important new path of research and attempts to counter these attacks. However, even if research finds solutions to counter known attacks, we show in this article that there is a threat in wireless sensor networks by using the 802.15.4 protocol. It is possible to hide data in PHY and MAC layers with steganographic techniques. In this article, we explain what steganography is, how we can use it in the layers of 802.15.4 protocol, how an attacker can do an attack and what we can do to detect this kind of threat.
  • Keywords
    access protocols; steganography; wireless sensor networks; 802.15.4 protocol; MAC Layers; PHY layers; steganographic techniques; steganography; wireless sensor networks; Cryptography; Media Access Protocol; Monitoring; Watermarking; Wireless sensor networks; 802.15.4 protocol; MAC layer; security; steganography; wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Systems and Networks Communications (ICSNC), 2010 Fifth International Conference on
  • Conference_Location
    Nice
  • Print_ISBN
    978-1-4244-7789-0
  • Electronic_ISBN
    978-0-7695-4145-7
  • Type

    conf

  • DOI
    10.1109/ICSNC.2010.11
  • Filename
    5634845