DocumentCode
3071663
Title
Attacks with Steganography in PHY and MAC Layers of 802.15.4 Protocol
Author
Martins, David ; GUyennet, Hervé
Author_Institution
Comput. Sci. Dept. LIFC, Univ. of Franche-Comte, Besançon, France
fYear
2010
fDate
22-27 Aug. 2010
Firstpage
31
Lastpage
36
Abstract
Wireless sensor networks are threatened by numerous attacks. Therefore, security is now becoming an important new path of research and attempts to counter these attacks. However, even if research finds solutions to counter known attacks, we show in this article that there is a threat in wireless sensor networks by using the 802.15.4 protocol. It is possible to hide data in PHY and MAC layers with steganographic techniques. In this article, we explain what steganography is, how we can use it in the layers of 802.15.4 protocol, how an attacker can do an attack and what we can do to detect this kind of threat.
Keywords
access protocols; steganography; wireless sensor networks; 802.15.4 protocol; MAC Layers; PHY layers; steganographic techniques; steganography; wireless sensor networks; Cryptography; Media Access Protocol; Monitoring; Watermarking; Wireless sensor networks; 802.15.4 protocol; MAC layer; security; steganography; wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Systems and Networks Communications (ICSNC), 2010 Fifth International Conference on
Conference_Location
Nice
Print_ISBN
978-1-4244-7789-0
Electronic_ISBN
978-0-7695-4145-7
Type
conf
DOI
10.1109/ICSNC.2010.11
Filename
5634845
Link To Document