skip to main content
10.1145/1352533.1352555acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Wireless and physical security via embedded sensor networks

Published:31 March 2008Publication History

ABSTRACT

Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames(Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the physical location of the offending party, as opposed to its possibly spoofed (MAC addresses) identity in cyber space. Traditional Wireless Network Security Systems are still heavily anchored in the digital plane of cyber space and hence cannot be used reliably or effectively to derive the physical identity of an intruder in order to prevent further malicious wireless broadcasts, for example by escorting an intruder off the premises based on physical evidence. In this paper, we argue that Embedded Sensor Networks could be used effectively to bridge the gap between digital and physical security planes, and thus could be leveraged to provide reciprocal benefit to surveillance and security tasks on both planes. Toward that end, we present our recent experience integrating wireless networking security services into the SNBENCH (SensorNetwork workBench). The SNBENCH provides an extensible framework that enables the rapid development and automated deployment of Sensor Network applications on a shared, embedded sensing and actuation infrastructure. The SNBENCH's extensible architecture allows an engineer to quickly integrate new sensing and response capabilities into the SNBENCH framework, while high-level languages and compilers allow novice SN programmers to compose SN service logic, unaware of the lower-level implementation details of tools on which their services rely. In this paper we convey the simplicity of the service composition through concrete examples that illustrate the power and potential of Wireless Security Services that span both the physical and digital plane.

References

  1. OpenWRT Project Homepage, http://openwrt.org/.Google ScholarGoogle Scholar
  2. Frank Adelstein, Prasanth Alla, Rob Joyce, and Golden G. Richard III, Physically Locating Wireless Intruders, ITCC'04: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 (Washington, DC, USA), IEEE Computer Society, 2004, p. 482. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. AirDefense, Inc., AirDefense Enterprise Product Homepage, http://www.airdefense.net/products/enterprise.php.Google ScholarGoogle Scholar
  4. Paramvir Bahl and Venkata N. Padmanabhan, RADAR: An In-Building RF-Based User Location and Tracking System, INFOCOM (2), 2000, pp. 775--784.Google ScholarGoogle Scholar
  5. John Bellardo and Stefan Savage, 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, SSYM'03: Proceedings of the 12th Conference on USENIX Security Symposium (Berkeley, CA, USA), USENIX Association, 2003, pp. 2--2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Azer Bestavros, Adam Bradley, Assaf Kfoury, and Michael Ocean, SNBENCH: A Development and Run-Time Platform for Rapid Deployment of Sensor Network Applications, IEEE International Workshop on Broadband Advanced Sensor Networks (Basenets), October, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  7. Boston University, Department of Computer Science, Sensorium Research Homepage, http://www.cs.bu.edu/groups/sensorium/.Google ScholarGoogle Scholar
  8. Christophe Devine, Aircrack-ng Homepage, http://www.aircrack-ng.org/.Google ScholarGoogle Scholar
  9. Ekahau, Inc., Ekahau Positioning Engine 4.0 Product Homepage, http://www.ekahau.com/products/positioningengine/.Google ScholarGoogle Scholar
  10. Jamil Farshchi, Wireless Intrusion Detection Systems, http://www.securityfocus.com/infocus/1742, 2003-11-05.Google ScholarGoogle Scholar
  11. IBM Internet Security Systems, Wireless Products Homepage, http://www.iss.net/documents/whitepapers/wireless_LAN_security.pdf.Google ScholarGoogle Scholar
  12. James Goddard Joshua Lackey, Andrew Roths, Wireless Intrusion Detection, http://www-935.ibm.com/services/us/bcrs/pdf/wp_wireless-intrusion-detection.pdf, 2003.Google ScholarGoogle Scholar
  13. Mike Kershaw, Kismet User Forum, http://www.kismetwireless.net/Forum/General/Messages/1142522037.4893529.Google ScholarGoogle Scholar
  14. _______, Kismet (version 2007-01-r1b), http://www.kismetwireless.net/documentation.shtml.Google ScholarGoogle Scholar
  15. Andrew Lockhart, Snort-wireless Homepage, http://snort-wireless.org/.Google ScholarGoogle Scholar
  16. "loud-fat bloke", WIDZ (Wireless Intrusion Detection System) Homepage, http://freshmeat.net/projects/widz/.Google ScholarGoogle Scholar
  17. Michael Lynn, AirIDS Project Homepage, http://airids.sourceforge.net/.Google ScholarGoogle Scholar
  18. Michael J. Ocean, Azer Bestavros, and Assaf J. Kfoury, SNBENCH: Programming and Virtualization Framework for Distributed Multitasking Sensor Networks, VEE '06: Proceedings of the 2nd International Conference on Virtual Execution Environments (New York, NY, USA), ACM Press, 2006, pp. 89--99. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Martin Roesch, Snort - Lightweight Intrusion Detection for Networks, LISA '99: Proceedings of the 13th USENIX Conference on System Administration (Berkeley, CA, USA), USENIX Association, 1999, pp. 229--238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Cisco Systems, Wi-Fi Based Real-Time Location Tracking: Solutions and Technology, http://www.cisco.com/application/pdf/en/us/guest/products/ps6386/c1244/cdccont_0900aecd80477957.pdf, 2006.Google ScholarGoogle Scholar
  21. P. Tao, A. Rudys, A. Ladd, and D. Wallach, Wireless LAN Location Sensing for Security Application, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Nathan True, Wi-viz: Wireless Network Environment Visualization, http://devices.natetrue.com/wiviz/.Google ScholarGoogle Scholar
  23. Giovanni Vigna, Fredrik Valeur, and Richard A. Kemmerer, Designing and Implementing a Family of Intrusion Detection Systems, SIGSOFT Softw. Eng. Notes 28 (2003), no. 5, 88--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Yoann Vandoorselaere, et. el., Prelude Hybrid IDS, http://www.prelude-ids.org/.Google ScholarGoogle Scholar
  25. Moustafa Youssef, Ashok Agrawala, and Udaya Shankar, WLAN Location Determination via Clustering and Probability Distributions, March 2003.Google ScholarGoogle Scholar

Index Terms

  1. Wireless and physical security via embedded sensor networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WiSec '08: Proceedings of the first ACM conference on Wireless network security
          March 2008
          234 pages
          ISBN:9781595938145
          DOI:10.1145/1352533

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 31 March 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate98of338submissions,29%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader