Download - Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks

Transcript
Page 1: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Weaponizing Wireless Networks:An Attack Tool for Launching Attacks against

Sensor Networks

Thanassis GiannetsosTassos DimitriouNeeli R. Prasad

Page 2: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Outline

• Background• Network Threats and Wireless Attacks• Tool Architecture Overview • Implemented Attacks and Actions• Conclusion• Reference

Page 3: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Background• Network Threats and Wireless Attacks• Tool Architecture Overview • Implemented Attacks and Actions• Conclusion• Reference

Page 4: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Background

• Wireless sensor network– Monitor physical or environmental conditions,

such as temperature, sound, vibration, pressure, motion or pollutants.

• Equip with a radio transceiver, a microcontroller, and a battery.

Page 5: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

• BackgroundNetwork Threats and Wireless Attacks• Tool Architecture Overview • Implemented Attacks and Actions• Conclusion• Reference

Page 6: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Network Threats and Wireless Attacks

• Inadequate physical protection– Energy and Cost

• Through the air– Easy to be intercepted

• Wireless Attack– Interception– Alteration– Disruption– Injection

Page 7: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

• Background• Network Threats and Wireless AttacksTool Architecture Overview • Implemented Attacks and Actions• Conclusion• Reference

Page 8: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Tool Architecture Overview

• Three Main Conceptual Modules:– Network Sniffer:• Monitoring and logging of radio packets.

– Network Attack Tool:• Provides a number of actions for attack.

– Network Visualization:• Display topology、 Traffic、 Nodes State and Status of

attack.

Page 9: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Tool Architecture Overview

Page 10: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Network Sniffer (1/3)

• The network sniffer relies on packets that are overheard in a sensor's node neighborhood.

• It captures them and logs them for later analysis.

• Components:– Local Packet Monitoring– Packet Storage– Packet Description Database

Page 11: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Network Sniffer (2/3)

• Local Packet Monitoring:– To gather audit data

• Packet Storage:– Logging and analysis– Construct graph of neighborhood topology

• Packet Description Database– User can specify msg content as C structs which

automatically added to DB

Page 12: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Network Sniffer (3/3)

Network Attack Tool

Analysis & Graph

Page 13: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Network Attack Tool (1/3)

• Provide a number of actions for compromising the sensor network's security profile.

• Components:– Data Stream Framework– Attack Launcher

Page 14: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Network Attack Tool (2/3)

• Data Stream Framework:– Identified info as its configuration record– Basis msg for Attack Launcher

• Attack Launcher:– 6 types of attacks:

① Data Replay② Malicious Code Injection③ Sinkhole Attack④ Selective Forwarding⑤ Flooding⑥ Program Image Dissemination & Ping Operation

Page 15: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Network Attack Tool (3/3)

Network Sniffer

Page 16: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

• Background• Network Threats and Wireless Attacks• Tool Architecture Overview Implemented Attacks and Actions• Conclusion• Reference

Page 17: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Implemented Attacks and Actions (1/3)

• Data Replay– Msg are stored into the Packet Description

Database.• Malicious Code Injection– Buffer overflow– Create self-replicating worm and broadcast it.

• Selective Forwarding

Page 18: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Implemented Attacks and Actions (2/3)

• Sinkhole Attack– Use link quality (LQ) calculations as the routing cost

metric to build the routing tree towards the base station.

– Broadcast a beacon message.– Advertise a very good LQ in order for all neighboring

nodes to choose the tools' attached node as their parent.

• Flooding– Send HELLO messages with high transmission power.

Send Msg

Page 19: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Implemented Attacks and Actions (2/3)

• Program Image Dissemination & Ping Operation– The ping action sends a message to a specific

sensor node to request about its state, its currently executing program image and what other images are stored in that node.

– Program Image dissemination is a fundamental service in sensor networks that relies upon reliable broadcast of image updates.

Page 20: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

• Background• Network Threats and Wireless Attacks• Tool Architecture Overview • Implemented Attacks and ActionsConclusion• Reference

Page 21: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Conclusion

• To reveal the vulnerabilities of such networks• To study the effects of severe attacks on the

network itself • To motivate a better design of security

protocols .

Page 22: Weaponizing  Wireless Networks: An Attack Tool for Launching Attacks  against Sensor  Networks

Reference

• http://www.exploit-db.com/download_pdf/15365

• http://en.wikipedia.org/wiki/Wireless_sensor_network

• http://ics.stpi.org.tw/Treatise/doc/73.pdf