Back to Search Start Over

The model of the attack implementation on wireless sensor networks

Authors :
Victoria Korzhuk
Irina Krivtsova
Ilya Shilov
Source :
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 776, Iss 20, Pp 187-194 (2017), FRUCT
Publication Year :
2017
Publisher :
FRUCT, 2017.

Abstract

The article presents a method of wireless sensor network attacks modelling. The main ways of attack committing are briefly described. The existing modelling environments are analysed to select the most appropriate tools for model creating. In order to simplify software implementation of the model of attacks on the ZigBee wireless sensor network, the main parameters of the packet transmission at the physical layer for different frequency bands and signal modulation schemes in accordance with the standard IEEE 802.15.4 are calculated. Based on these data, the basic assumptions and limitations for the model are introduced. A software model of implementation of the various attacks on integrity and availability in wireless sensor networks based on OMNeT++ simulator is realized. Two topologies: mesh network and cluster tree are presented. For each topology its own addressing scheme and routing is provided: AODV for mesh network and domain addressing for the clustered tree. The experiment connected with the count of all packets and route packets in consecutive intervals is conducted. The described model may be used to obtain statistical information about the interactions in the wireless sensor network and about the attacks on such network.

Details

Language :
English
ISSN :
23430737 and 23057254
Volume :
776
Issue :
20
Database :
OpenAIRE
Journal :
Proceedings of the XXth Conference of Open Innovations Association FRUCT
Accession number :
edsair.doi.dedup.....b6d75824bf94ccc5c59d9558444edbd7