Since the inception of side channel attacks, research has gone a long way in proving that embedded devices capable of running cryptographic algorithms are highly susceptible to these attacks. These attacks are non-invasive in which an attacker can obtain confidential information such as secret keys by simply observing the side channel information leakage (such as the power consumption, timing, and electromagnetic emanations). Wireless sensor networks are particularly vulnerable to these attacks as they are deployed in open environments with no protective physical shielding. In this survey paper, we give an overview of the side channel attacks (particularly power analysis attacks) against wireless sensor networks and in addition discuss some of the suggested countermeasures against power analysis attacks.
Reference:
Moabalobelo, T, Nelwamondo, F and Tsague, HD. Survey on the cryptanalysis of wireless sensor networks using side-channel analysis. Southern Africa Telecommunication Networks and Applications Conference (SATNAC), George, Western Cape, 2-5 September 2012
Moabalobelo, T., Nelwamondo, F. V., & Tsague, H. (2012). Survey on the cryptanalysis of wireless sensor networks using side-channel analysis. http://hdl.handle.net/10204/6107
Moabalobelo, T, Fulufhelo V Nelwamondo, and HD Tsague. "Survey on the cryptanalysis of wireless sensor networks using side-channel analysis." (2012): http://hdl.handle.net/10204/6107
Moabalobelo T, Nelwamondo FV, Tsague H, Survey on the cryptanalysis of wireless sensor networks using side-channel analysis; 2012. http://hdl.handle.net/10204/6107 .