Banaid a sensor network test bed for wormhole attack
This presentation is the property of its rightful owner.
Sponsored Links
1 / 26

BANAID: A Sensor Network Test-Bed for Wormhole Attack PowerPoint PPT Presentation


  • 91 Views
  • Uploaded on
  • Presentation posted in: General

BANAID: A Sensor Network Test-Bed for Wormhole Attack. Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou. BANAID. Overview. Background. The Wormhole Attack on WSN. BANAID. Conclusion. Sensor Networks.

Download Presentation

BANAID: A Sensor Network Test-Bed for Wormhole Attack

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Banaid a sensor network test bed for wormhole attack

BANAID: A Sensor Network Test-Bed for Wormhole Attack

HaniAlzaid

Suhail AbanmiSalil KanhereChun Tung Chou

BANAID


Overview

Overview

  • Background.

  • The Wormhole Attack on WSN.

  • BANAID.

  • Conclusion.


Sensor networks

Sensor Networks

  • Distributed network of wireless nodes that monitor the environment or other systems.

  • Deployed in large numbers

  • Nodes have limited battery life

  • Nodes have low computational power

  • Nodes have small data storage

Background


Sensor networks1

Sensor Networks

Base station

A

s1

s0

Thousands of small devices with sensors communicating wirelessly

Background


Wsn application

WSN Application

  • Civil structural monitoring

  • Habitat/ecosystem monitoring

  • Environmental monitoring

  • Smart homes

  • Chemical Detection

  • Traffic/Vehicle Monitoring

  • Human Health Monitoring

  • Homeland Security

Background


Banaid a sensor network test bed for wormhole attack

QUIZ

  • What are the limited resources in WSN?

  • Energy, memory, and computation.

  • Energy, communication, and memory.

  • Computation, communication, and memory.

Background


Quiz winner is

QUIZ WINNER IS…

  • Who is it?


Overview1

Overview

  • Background.

  • The Wormhole Attack on WSN.

  • BANAID.

  • Conclusion.


Routing tree

Routing Tree

Adapted from Chris Karlof and David Wagner's WSNPA slides

Wormhole Attack


Routing

Routing

Adapted from Chris Karlof and David Wagner's WSNPA slides

Wormhole Attack


Wormhole attack

Wormhole Attack

  • Tunnel packets received in one place of the network and replay them in another place

  • The attacker can have no key material. All it requires is two transceivers and one high quality out-of-band channel

Adapted from Chris Karlof and David Wagner's WSNPA slides

Wormhole Attack


Disrupted routing

Disrupted Routing

  • Most packets will be routed to the wormhole

  • The wormhole can drop packets or more subtly, selectively forward packets to avoid detection

Adapted from Chris Karlof and David Wagner's WSNPA slides

Wormhole Attack


Overview2

Overview

  • Background.

  • The Wormhole Attack on WSN.

  • BANAID.

  • Conclusion.


Banaid

BANAID

  • BANAID is composed of:

    • 7 Mica2 sensors.

    • 2 Stargates.

  • The topology is assumed to be fixed.

  • Each sensor knows its neighbors.

BANAID


Banaid1

BANAID

  • Three programs have been written and installed:

    • TOSBase program (sensor 5, and 6).

    • Stargate program (stargate 1, and 2).

    • Simple customized AODV program (sensor 1,2,3 and 4).

BANAID


Banaid2

BANAID

  • Timing mechanism is required to detect Wormhole attack[1].

  • The average transmission delay in each sensor is ≈45 msec (Td ≈ 45msec) [2].

BANAID


Banaid3

BANAID

  • Delay on the real path:

    Ns * Td.

    3 * Td.

  • Delay on the fake path:

    Ns * Td.

    2 * Td

BANAID


Overview3

Overview

  • Background.

  • The Wormhole Attack on WSN.

  • BANAID.

  • Conclusion.


Conclusion

Conclusion

  • Wormhole attack is a significant danger to routing protocols WSN.

  • BANAID implemented one of the Wormhole attack’s solutions for WSN which is Packet Leaches [1].

  • The destination is able to detect the fake packet if the difference in time stamp is < (Ns * Td) where Ns is the number of sensors/hops between source and destination in the real path.


Banaid a sensor network test bed for wormhole attack

QUIZ

  • What is the function of TOSBase?

  • Initiates Wi-Fi connection

  • Exchange packets with other Mica2

  • Forwards packets received from radio antenna to serial port and vice versa.

  • Exchange routing information.


Quiz winner is1

QUIZ WINNER IS…

  • Who is it?


References

References

[1] Hu, Y., Perrig, A., & Johnson, D.B. “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks,” Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), vol. 3, pp. 1976-1986, IEEE, San Francisco, CA, April 2003.

[2] Paek, J., Chintalapudi, K., & Govindan, R.“A Wireless Sensor Network for Structural Health Monitoring: Performance and Experience”2005.

[3] Crossbow Technology, Inc., MPR/MIB Mote Hardware Users Manual, http://www.xbow.com/Support/Support_pdf_files/MPR-MIB_Series_Users_Manual.pdf

[4] Crossbow Technology, Inc., Stargate Developer’s Manual, http://www.xbow.com/Support/Support_pdf_files/Stargate_Manual.pdf


Thank you

Thank you

Questions?


Node hardware

Node Hardware

128KB-1MB

Limited Storage

1Kbps - 1Mbps,

3-100 Meters,

Transceiver

Memory

Embedded

Processor

8-bit, 10 MHz

Slow Computations

Sensors

Battery

Limited Lifetime

BANAID


Mica2 3

Mica2 [3]

  • Extremely popular mote

  • 8-bit Atmega128 micro-controller

  • FSK radio

  • TinyOS.

Back

BANAID


Stargate 4

Stargate [4]

  • 400 MHz processor.

  • Linux.

  • Wi-Fi compact flash card.

  • MICA2 connector.

Back

BANAID


  • Login