1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun...
-
Upload
thomas-wilcox -
Category
Documents
-
view
220 -
download
0
Transcript of 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun...
![Page 1: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/1.jpg)
1
BANAID: A Sensor Network Test-Bed for Wormhole Attack
Hani AlzaidSuhail Abanmi Salil Kanhere Chun Tung
ChouBANAID
![Page 2: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/2.jpg)
2
Overview
Background. The Wormhole Attack on WSN. BANAID. Conclusion.
![Page 3: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/3.jpg)
3
Sensor Networks
Distributed network of wireless nodes that monitor the environment or other systems.
Deployed in large numbers Nodes have limited battery life Nodes have low computational
power Nodes have small data storage
Background
![Page 4: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/4.jpg)
4
Sensor Networks
Thousands of small devices with sensors communicating wirelessly
Base station
s0
s1A
Background
![Page 5: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/5.jpg)
5
WSN Application Civil structural monitoring Habitat/ecosystem monitoring Environmental monitoring Smart homes Chemical Detection Traffic/Vehicle Monitoring Human Health Monitoring Homeland Security
Background
![Page 6: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/6.jpg)
QUIZ What are the limited resources in
WSN?
1. Energy, memory, and computation.
2. Energy, communication, and memory.
3. Computation, communication, and memory.
Background
![Page 7: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/7.jpg)
QUIZ WINNER IS…
Who is it?
![Page 8: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/8.jpg)
8
Overview
Background. The Wormhole Attack on WSN. BANAID. Conclusion.
![Page 9: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/9.jpg)
9
Routing Tree
Adapted from Chris Karlof and David Wagner's WSNPA slidesWormhole Attack
![Page 10: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/10.jpg)
10
Routing
Adapted from Chris Karlof and David Wagner's WSNPA slidesWormhole Attack
![Page 11: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/11.jpg)
11
Wormhole Attack Tunnel packets
received in one place of the network and replay them in another place
The attacker can have no key material. All it requires is two transceivers and one high quality out-of-band channel Adapted from Chris Karlof and
David Wagner's WSNPA slidesWormhole Attack
![Page 12: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/12.jpg)
12
Disrupted Routing
Most packets will be routed to the wormhole
The wormhole can drop packets or more subtly, selectively forward packets to avoid detection
Adapted from Chris Karlof and David Wagner's WSNPA slidesWormhole Attack
![Page 13: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/13.jpg)
13
Overview
Background. The Wormhole Attack on WSN. BANAID. Conclusion.
![Page 14: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/14.jpg)
14
BANAID BANAID is
composed of: 7 Mica2 sensors. 2 Stargates.
The topology is assumed to be fixed.
Each sensor knows its neighbors.
BANAID
![Page 15: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/15.jpg)
15
BANAID Three programs have
been written and installed: TOSBase program
(sensor 5, and 6). Stargate program
(stargate 1, and 2). Simple customized
AODV program (sensor 1,2,3 and 4).
BANAID
![Page 16: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/16.jpg)
16
BANAID
Timing mechanism is required to detect Wormhole attack[1].
The average transmission delay in each sensor is ≈45 msec (Td ≈ 45msec) [2].
BANAID
![Page 17: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/17.jpg)
17
BANAID Delay on the real
path: Ns * Td. 3 * Td.
Delay on the fake path:
Ns * Td. 2 * Td
BANAID
![Page 18: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/18.jpg)
18
Overview
Background. The Wormhole Attack on WSN. BANAID. Conclusion.
![Page 19: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/19.jpg)
19
Conclusion Wormhole attack is a significant danger
to routing protocols WSN. BANAID implemented one of the
Wormhole attack’s solutions for WSN which is Packet Leaches [1].
The destination is able to detect the fake packet if the difference in time stamp is < (Ns * Td) where Ns is the number of sensors/hops between source and destination in the real path.
![Page 20: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/20.jpg)
QUIZ What is the function of TOSBase?
1. Initiates Wi-Fi connection
2. Exchange packets with other Mica2
3. Forwards packets received from radio antenna to serial port and vice versa.
4. Exchange routing information.
![Page 21: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/21.jpg)
QUIZ WINNER IS…
Who is it?
![Page 22: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/22.jpg)
22
References[1] Hu, Y., Perrig, A., & Johnson, D.B. “Packet Leashes: A Defense
against Wormhole Attacks in Wireless Ad Hoc Networks,” Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), vol. 3, pp. 1976-1986, IEEE, San Francisco, CA, April 2003.
[2] Paek, J., Chintalapudi, K., & Govindan, R.“A Wireless Sensor Network for Structural Health Monitoring: Performance and Experience”2005.
[3] Crossbow Technology, Inc., MPR/MIB Mote Hardware Users Manual, http://www.xbow.com/Support/Support_pdf_files/MPR-MIB_Series_Users_Manual.pdf
[4] Crossbow Technology, Inc., Stargate Developer’s Manual, http://www.xbow.com/Support/Support_pdf_files/Stargate_Manual.pdf
![Page 23: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/23.jpg)
23
Thank you
Questions?
![Page 24: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/24.jpg)
24
Node Hardware
EmbeddedProcessor
Transceiver
Memory
SensorsBattery
Limited Lifetime
8-bit, 10 MHzSlow Computations
1Kbps - 1Mbps, 3-100 Meters,
128KB-1MBLimited Storage
BANAID
![Page 25: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/25.jpg)
25
Mica2 [3]
Extremely popular mote
8-bit Atmega128 micro-controller
FSK radio TinyOS.
Back
BANAID
![Page 26: 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.](https://reader035.fdocuments.in/reader035/viewer/2022062322/56649dce5503460f94ac1f93/html5/thumbnails/26.jpg)
26
Stargate [4]
400 MHz processor. Linux. Wi-Fi compact flash
card. MICA2 connector.
Back
BANAID