Banaid a sensor network test bed for wormhole attack
This presentation is the property of its rightful owner.
Sponsored Links
1 / 26

BANAID: A Sensor Network Test-Bed for Wormhole Attack PowerPoint PPT Presentation


  • 97 Views
  • Uploaded on
  • Presentation posted in: General

BANAID: A Sensor Network Test-Bed for Wormhole Attack. Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou. BANAID. Overview. Background. The Wormhole Attack on WSN. BANAID. Conclusion. Sensor Networks.

Download Presentation

BANAID: A Sensor Network Test-Bed for Wormhole Attack

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


BANAID: A Sensor Network Test-Bed for Wormhole Attack

HaniAlzaid

Suhail AbanmiSalil KanhereChun Tung Chou

BANAID


Overview

  • Background.

  • The Wormhole Attack on WSN.

  • BANAID.

  • Conclusion.


Sensor Networks

  • Distributed network of wireless nodes that monitor the environment or other systems.

  • Deployed in large numbers

  • Nodes have limited battery life

  • Nodes have low computational power

  • Nodes have small data storage

Background


Sensor Networks

Base station

A

s1

s0

Thousands of small devices with sensors communicating wirelessly

Background


WSN Application

  • Civil structural monitoring

  • Habitat/ecosystem monitoring

  • Environmental monitoring

  • Smart homes

  • Chemical Detection

  • Traffic/Vehicle Monitoring

  • Human Health Monitoring

  • Homeland Security

Background


QUIZ

  • What are the limited resources in WSN?

  • Energy, memory, and computation.

  • Energy, communication, and memory.

  • Computation, communication, and memory.

Background


QUIZ WINNER IS…

  • Who is it?


Overview

  • Background.

  • The Wormhole Attack on WSN.

  • BANAID.

  • Conclusion.


Routing Tree

Adapted from Chris Karlof and David Wagner's WSNPA slides

Wormhole Attack


Routing

Adapted from Chris Karlof and David Wagner's WSNPA slides

Wormhole Attack


Wormhole Attack

  • Tunnel packets received in one place of the network and replay them in another place

  • The attacker can have no key material. All it requires is two transceivers and one high quality out-of-band channel

Adapted from Chris Karlof and David Wagner's WSNPA slides

Wormhole Attack


Disrupted Routing

  • Most packets will be routed to the wormhole

  • The wormhole can drop packets or more subtly, selectively forward packets to avoid detection

Adapted from Chris Karlof and David Wagner's WSNPA slides

Wormhole Attack


Overview

  • Background.

  • The Wormhole Attack on WSN.

  • BANAID.

  • Conclusion.


BANAID

  • BANAID is composed of:

    • 7 Mica2 sensors.

    • 2 Stargates.

  • The topology is assumed to be fixed.

  • Each sensor knows its neighbors.

BANAID


BANAID

  • Three programs have been written and installed:

    • TOSBase program (sensor 5, and 6).

    • Stargate program (stargate 1, and 2).

    • Simple customized AODV program (sensor 1,2,3 and 4).

BANAID


BANAID

  • Timing mechanism is required to detect Wormhole attack[1].

  • The average transmission delay in each sensor is ≈45 msec (Td ≈ 45msec) [2].

BANAID


BANAID

  • Delay on the real path:

    Ns * Td.

    3 * Td.

  • Delay on the fake path:

    Ns * Td.

    2 * Td

BANAID


Overview

  • Background.

  • The Wormhole Attack on WSN.

  • BANAID.

  • Conclusion.


Conclusion

  • Wormhole attack is a significant danger to routing protocols WSN.

  • BANAID implemented one of the Wormhole attack’s solutions for WSN which is Packet Leaches [1].

  • The destination is able to detect the fake packet if the difference in time stamp is < (Ns * Td) where Ns is the number of sensors/hops between source and destination in the real path.


QUIZ

  • What is the function of TOSBase?

  • Initiates Wi-Fi connection

  • Exchange packets with other Mica2

  • Forwards packets received from radio antenna to serial port and vice versa.

  • Exchange routing information.


QUIZ WINNER IS…

  • Who is it?


References

[1] Hu, Y., Perrig, A., & Johnson, D.B. “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks,” Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), vol. 3, pp. 1976-1986, IEEE, San Francisco, CA, April 2003.

[2] Paek, J., Chintalapudi, K., & Govindan, R.“A Wireless Sensor Network for Structural Health Monitoring: Performance and Experience”2005.

[3] Crossbow Technology, Inc., MPR/MIB Mote Hardware Users Manual, http://www.xbow.com/Support/Support_pdf_files/MPR-MIB_Series_Users_Manual.pdf

[4] Crossbow Technology, Inc., Stargate Developer’s Manual, http://www.xbow.com/Support/Support_pdf_files/Stargate_Manual.pdf


Thank you

Questions?


Node Hardware

128KB-1MB

Limited Storage

1Kbps - 1Mbps,

3-100 Meters,

Transceiver

Memory

Embedded

Processor

8-bit, 10 MHz

Slow Computations

Sensors

Battery

Limited Lifetime

BANAID


Mica2 [3]

  • Extremely popular mote

  • 8-bit Atmega128 micro-controller

  • FSK radio

  • TinyOS.

Back

BANAID


Stargate [4]

  • 400 MHz processor.

  • Linux.

  • Wi-Fi compact flash card.

  • MICA2 connector.

Back

BANAID


  • Login