Publication detail

Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network

KRIVTSOVA, I. LEBEDEV, I. SUKHOPAROV, M. BAZHAYEV, N. ZIKRATOV, I. OMETOV, A. ANDREEV, S. MAŠEK, P. FUJDIAK, R. HOŠEK, J.

Original Title

Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network

Czech Title

Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network

English Title

Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network

Type

conference paper

Language

en

Original Abstract

In this work, we emphasize the practical importance of missioncritical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.

Czech abstract

In this work, we emphasize the practical importance of missioncritical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.

English abstract

In this work, we emphasize the practical importance of missioncritical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.

Keywords

Information security, ad hoc networks, multi-agent systems, vulnerability, device availability, prototyping

Released

27.05.2016

ISBN

978-3-319-22572-2

Book

The 14th International Conference on Wired/Wireless Internet Communications - WWIC 2016

Pages from

1

Pages to

12

Pages count

12

BibTex


@inproceedings{BUT124441,
  author="Irina {Krivtsova} and Ilya {Lebedev} and Mikhail {Sukhoparov} and Nurzhan {Bazhayev} and Igor {Zikratov} and Aleksandr {Ometov} and Sergey {Andreev} and Pavel {Mašek} and Radek {Fujdiak} and Jiří {Hošek}",
  title="Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network",
  annote="In this work, we emphasize the practical importance of missioncritical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.",
  booktitle="The 14th International Conference on Wired/Wireless Internet Communications - WWIC 2016",
  chapter="124441",
  howpublished="online",
  year="2016",
  month="may",
  pages="1--12",
  type="conference paper"
}