Tampere University of Technology

TUTCRIS Research Portal

Implementing a broadcast storm attack on a mission-critical wireless sensor network

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Details

Original languageEnglish
Title of host publicationWired/Wireless Internet Communications
Subtitle of host publication14th IFIP WG 6.2 International Conference, WWIC 2016, Thessaloniki, Greece, May 25-27, 2016, Proceedings
PublisherSpringer Verlag
Pages297-308
Number of pages12
Volume9674
ISBN (Print)9783319339351
DOIs
Publication statusPublished - 2016
Publication typeA4 Article in a conference publication
EventInternational Conference on Wired/Wireless Internet Communication -
Duration: 1 Jan 1900 → …

Publication series

NameLecture Notes in Computer Science
Volume9674
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Wired/Wireless Internet Communication
Period1/01/00 → …

Abstract

In this work, we emphasize the practical importance of mission-critical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.

Keywords

  • Ad hoc networks, Device availability, Information security, Multi-agent systems, Prototyping, Vulnerability

Publication forum classification