Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.

Similar presentations


Presentation on theme: "1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID."— Presentation transcript:

1 1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID

2 2 Overview Background. The Wormhole Attack on WSN. BANAID. Conclusion.

3 3 Sensor Networks Distributed network of wireless nodes that monitor the environment or other systems. Deployed in large numbers Nodes have limited battery life Nodes have low computational power Nodes have small data storage Background

4 4 Sensor Networks Thousands of small devices with sensors communicating wirelessly Base station s0s0 s1s1 A Background

5 5 WSN Application Civil structural monitoring Habitat/ecosystem monitoring Environmental monitoring Smart homes Chemical Detection Traffic/Vehicle Monitoring Human Health Monitoring Homeland Security Background

6 QUIZ What are the limited resources in WSN? 1. Energy, memory, and computation. 2. Energy, communication, and memory. 3. Computation, communication, and memory. Background

7 QUIZ WINNER IS… Who is it?

8 8 Overview Background. The Wormhole Attack on WSN. BANAID. Conclusion.

9 9 Routing Tree Adapted from Chris Karlof and David Wagner's WSNPA slides Wormhole Attack

10 10 Routing Adapted from Chris Karlof and David Wagner's WSNPA slides Wormhole Attack

11 11 Wormhole Attack Tunnel packets received in one place of the network and replay them in another place The attacker can have no key material. All it requires is two transceivers and one high quality out-of- band channel Adapted from Chris Karlof and David Wagner's WSNPA slides Wormhole Attack

12 12 Disrupted Routing Most packets will be routed to the wormhole The wormhole can drop packets or more subtly, selectively forward packets to avoid detection Adapted from Chris Karlof and David Wagner's WSNPA slides Wormhole Attack

13 13 Overview Background. The Wormhole Attack on WSN. BANAID. Conclusion.

14 14 BANAID BANAID is composed of: 7 Mica2 sensors. 2 Stargates. The topology is assumed to be fixed. Each sensor knows its neighbors. BANAID

15 15 BANAID Three programs have been written and installed: TOSBase program (sensor 5, and 6). Stargate program (stargate 1, and 2). Simple customized AODV program (sensor 1,2,3 and 4). BANAID

16 16 BANAID Timing mechanism is required to detect Wormhole attack [1]. The average transmission delay in each sensor is ≈45 msec (Td ≈ 45msec) [2]. BANAID

17 17 BANAID Delay on the real path: Ns * Td. 3 * Td. Delay on the fake path: Ns * Td. 2 * Td BANAID

18 18 Overview Background. The Wormhole Attack on WSN. BANAID. Conclusion.

19 19 Conclusion Wormhole attack is a significant danger to routing protocols WSN. BANAID implemented one of the Wormhole attack’s solutions for WSN which is Packet Leaches [1]. The destination is able to detect the fake packet if the difference in time stamp is < (Ns * Td) where Ns is the number of sensors/hops between source and destination in the real path.

20 QUIZ What is the function of TOSBase? 1. Initiates Wi-Fi connection 2. Exchange packets with other Mica2 3. Forwards packets received from radio antenna to serial port and vice versa. 4. Exchange routing information.

21 QUIZ WINNER IS… Who is it?

22 22 References [1] Hu, Y., Perrig, A., & Johnson, D.B. “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks,” Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), vol. 3, pp. 1976-1986, IEEE, San Francisco, CA, April 2003. [2] Paek, J., Chintalapudi, K., & Govindan, R.“A Wireless Sensor Network for Structural Health Monitoring: Performance and Experience”2005. [3] Crossbow Technology, Inc., MPR/MIB Mote Hardware Users Manual, http://www.xbow.com/Support/Support_pdf_files/MPR- MIB_Series_Users_Manual.pdf http://www.xbow.com/Support/Support_pdf_files/MPR- MIB_Series_Users_Manual.pdf [4] Crossbow Technology, Inc., Stargate Developer’s Manual, http://www.xbow.com/Support/Support_pdf_files/Stargate_Manual.pdf http://www.xbow.com/Support/Support_pdf_files/Stargate_Manual.pdf

23 23 Thank you Questions?

24 24 Node Hardware Embedded Processor Transceiver Memory Sensors Battery Limited Lifetime 8-bit, 10 MHz Slow Computations 1Kbps - 1Mbps, 3-100 Meters, 128KB-1MB Limited Storage BANAID

25 25 Mica2 [3] Extremely popular mote 8-bit Atmega128 micro- controller FSK radio TinyOS. Back BANAID

26 26 Stargate [4] 400 MHz processor. Linux. Wi-Fi compact flash card. MICA2 connector. Back BANAID


Download ppt "1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID."

Similar presentations


Ads by Google