BANAID: A Sensor Network Test-Bed for Wormhole Attack

26
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail Abanmi Salil Kanhere Chun Tung Chou BANAID

description

BANAID: A Sensor Network Test-Bed for Wormhole Attack. Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou. BANAID. Overview. Background. The Wormhole Attack on WSN. BANAID. Conclusion. Sensor Networks. - PowerPoint PPT Presentation

Transcript of BANAID: A Sensor Network Test-Bed for Wormhole Attack

Page 1: BANAID: A Sensor Network Test-Bed for Wormhole Attack

1

BANAID: A Sensor Network Test-Bed for Wormhole Attack

Hani AlzaidSuhail Abanmi Salil Kanhere Chun Tung

ChouBANAID

Page 2: BANAID: A Sensor Network Test-Bed for Wormhole Attack

2

Overview

Background. The Wormhole Attack on WSN. BANAID. Conclusion.

Page 3: BANAID: A Sensor Network Test-Bed for Wormhole Attack

3

Sensor Networks

Distributed network of wireless nodes that monitor the environment or other systems.

Deployed in large numbers Nodes have limited battery life Nodes have low computational

power Nodes have small data storage

Background

Page 4: BANAID: A Sensor Network Test-Bed for Wormhole Attack

4

Sensor Networks

Thousands of small devices with sensors communicating wirelessly

Base station

s0

s1A

Background

Page 5: BANAID: A Sensor Network Test-Bed for Wormhole Attack

5

WSN Application Civil structural monitoring Habitat/ecosystem monitoring Environmental monitoring Smart homes Chemical Detection Traffic/Vehicle Monitoring Human Health Monitoring Homeland Security

Background

Page 6: BANAID: A Sensor Network Test-Bed for Wormhole Attack

QUIZ What are the limited resources in

WSN?

1. Energy, memory, and computation.

2. Energy, communication, and memory.

3. Computation, communication, and memory.

Background

Page 7: BANAID: A Sensor Network Test-Bed for Wormhole Attack

QUIZ WINNER IS…

Who is it?

Page 8: BANAID: A Sensor Network Test-Bed for Wormhole Attack

8

Overview

Background. The Wormhole Attack on WSN. BANAID. Conclusion.

Page 9: BANAID: A Sensor Network Test-Bed for Wormhole Attack

9

Routing Tree

Adapted from Chris Karlof and David Wagner's WSNPA slidesWormhole Attack

Page 10: BANAID: A Sensor Network Test-Bed for Wormhole Attack

10

Routing

Adapted from Chris Karlof and David Wagner's WSNPA slidesWormhole Attack

Page 11: BANAID: A Sensor Network Test-Bed for Wormhole Attack

11

Wormhole Attack Tunnel packets

received in one place of the network and replay them in another place

The attacker can have no key material. All it requires is two transceivers and one high quality out-of-band channel Adapted from Chris Karlof and

David Wagner's WSNPA slidesWormhole Attack

Page 12: BANAID: A Sensor Network Test-Bed for Wormhole Attack

12

Disrupted Routing

Most packets will be routed to the wormhole

The wormhole can drop packets or more subtly, selectively forward packets to avoid detection

Adapted from Chris Karlof and David Wagner's WSNPA slidesWormhole Attack

Page 13: BANAID: A Sensor Network Test-Bed for Wormhole Attack

13

Overview

Background. The Wormhole Attack on WSN. BANAID. Conclusion.

Page 14: BANAID: A Sensor Network Test-Bed for Wormhole Attack

14

BANAID BANAID is

composed of: 7 Mica2 sensors. 2 Stargates.

The topology is assumed to be fixed.

Each sensor knows its neighbors.

BANAID

Page 15: BANAID: A Sensor Network Test-Bed for Wormhole Attack

15

BANAID Three programs have

been written and installed: TOSBase program

(sensor 5, and 6). Stargate program

(stargate 1, and 2). Simple customized

AODV program (sensor 1,2,3 and 4).

BANAID

Page 16: BANAID: A Sensor Network Test-Bed for Wormhole Attack

16

BANAID

Timing mechanism is required to detect Wormhole attack[1].

The average transmission delay in each sensor is ≈45 msec (Td ≈ 45msec) [2].

BANAID

Page 17: BANAID: A Sensor Network Test-Bed for Wormhole Attack

17

BANAID Delay on the real

path: Ns * Td. 3 * Td.

Delay on the fake path:

Ns * Td. 2 * Td

BANAID

Page 18: BANAID: A Sensor Network Test-Bed for Wormhole Attack

18

Overview

Background. The Wormhole Attack on WSN. BANAID. Conclusion.

Page 19: BANAID: A Sensor Network Test-Bed for Wormhole Attack

19

Conclusion Wormhole attack is a significant danger

to routing protocols WSN. BANAID implemented one of the

Wormhole attack’s solutions for WSN which is Packet Leaches [1].

The destination is able to detect the fake packet if the difference in time stamp is < (Ns * Td) where Ns is the number of sensors/hops between source and destination in the real path.

Page 20: BANAID: A Sensor Network Test-Bed for Wormhole Attack

QUIZ What is the function of TOSBase?

1. Initiates Wi-Fi connection

2. Exchange packets with other Mica2

3. Forwards packets received from radio antenna to serial port and vice versa.

4. Exchange routing information.

Page 21: BANAID: A Sensor Network Test-Bed for Wormhole Attack

QUIZ WINNER IS…

Who is it?

Page 22: BANAID: A Sensor Network Test-Bed for Wormhole Attack

22

References[1] Hu, Y., Perrig, A., & Johnson, D.B. “Packet Leashes: A Defense

against Wormhole Attacks in Wireless Ad Hoc Networks,” Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), vol. 3, pp. 1976-1986, IEEE, San Francisco, CA, April 2003.

[2] Paek, J., Chintalapudi, K., & Govindan, R.“A Wireless Sensor Network for Structural Health Monitoring: Performance and Experience”2005.

[3] Crossbow Technology, Inc., MPR/MIB Mote Hardware Users Manual, http://www.xbow.com/Support/Support_pdf_files/MPR-MIB_Series_Users_Manual.pdf

[4] Crossbow Technology, Inc., Stargate Developer’s Manual, http://www.xbow.com/Support/Support_pdf_files/Stargate_Manual.pdf

Page 23: BANAID: A Sensor Network Test-Bed for Wormhole Attack

23

Thank you

Questions?

Page 24: BANAID: A Sensor Network Test-Bed for Wormhole Attack

24

Node Hardware

EmbeddedProcessor

Transceiver

Memory

SensorsBattery

Limited Lifetime

8-bit, 10 MHzSlow Computations

1Kbps - 1Mbps, 3-100 Meters,

128KB-1MBLimited Storage

BANAID

Page 25: BANAID: A Sensor Network Test-Bed for Wormhole Attack

25

Mica2 [3]

Extremely popular mote

8-bit Atmega128 micro-controller

FSK radio TinyOS.

Back

BANAID

Page 26: BANAID: A Sensor Network Test-Bed for Wormhole Attack

26

Stargate [4]

400 MHz processor. Linux. Wi-Fi compact flash

card. MICA2 connector.

Back

BANAID