Detail publikace

Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network

Originální název

Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network

Anglický název

Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network

Jazyk

en

Originální abstrakt

In this work, we emphasize the practical importance of missioncritical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.

Anglický abstrakt

In this work, we emphasize the practical importance of missioncritical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.

BibTex


@inproceedings{BUT124441,
  author="Irina {Krivtsova} and Ilya {Lebedev} and Mikhail {Sukhoparov} and Nurzhan {Bazhayev} and Igor {Zikratov} and Aleksandr {Ometov} and Sergey {Andreev} and Pavel {Mašek} and Radek {Fujdiak} and Jiří {Hošek}",
  title="Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network",
  annote="In this work, we emphasize the practical importance of missioncritical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.",
  booktitle="The 14th International Conference on Wired/Wireless Internet Communications - WWIC 2016",
  chapter="124441",
  howpublished="online",
  year="2016",
  month="may",
  pages="1--12",
  type="conference paper"
}