The model of the attack implementation on wireless sensor networks
The article presents a method of wireless sensor network attacks modelling. The main ways of attack committing are briefly described. The existing modelling environments are analysed to select the most appropriate tools for model creating. In order to simplify software implementation of the model of...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The article presents a method of wireless sensor network attacks modelling. The main ways of attack committing are briefly described. The existing modelling environments are analysed to select the most appropriate tools for model creating. In order to simplify software implementation of the model of attacks on the ZigBee wireless sensor network, the main parameters of the packet transmission at the physical layer for different frequency bands and signal modulation schemes in accordance with the standard IEEE 802.15.4 are calculated. Based on these data, the basic assumptions and limitations for the model are introduced. A software model of implementation of the various attacks on integrity and availability in wireless sensor networks based on OMNeT++ simulator is realized. Two topologies: mesh network and cluster tree are presented. For each topology its own addressing scheme and routing is provided: AODV for mesh network and domain addressing for the clustered tree. The experiment connected with the count of all packets and route packets in consecutive intervals is conducted. The described model may be used to obtain statistical information about the interactions in the wireless sensor network and about the attacks on such network. |
---|---|
ISSN: | 2305-7254 2305-7254 2343-0737 |
DOI: | 10.23919/FRUCT.2017.8071310 |