This article presents a novel approach to the analysis of wireless sensor networks (WSN) security, based on the regulations\nintended forwireless communication devices. Starting fromthe analysis and classification of attacks, countermeasures, and available\nprotocols, we present the current state on secure communication stacks for embedded systems. The regulation analysis is based on\ncivil EN 50150 and MIL STD-188-220, both applicable to WSN communications. Afterwards, starting from a list of known WSN\nattacks,we use a correspondence table tomatchWSNattacks with countermeasures required by regulations. This approach allows us\nto produce a precise security evaluation and classification methodology forWSN protocols. The results show that current protocols\ndo not present a complete coverage of security issues.While this conclusion is already known for manyWSN protocols, to the best\nof our knowledge this is the first time a complete methodology is proposed to base this assertion.Moreover, by using the proposed\nmethodology, we are able to precisely identify the exposed threats for eachWSN protocol under analysis
Loading....