Secure Data Aggregation in Wireless Sensor Networks: A Survey

BANAID: A Sensor Network
Test-Bed for Wormhole Attack
Suhail Abanmi
BANAID
Hani Alzaid
Salil Kanhere
Chun Tung Chou
1
Overview




Background.
The Wormhole Attack on WSN.
BANAID.
Conclusion.
2
Sensor Networks





Background
Distributed network of wireless nodes
that monitor the environment or other
systems.
Deployed in large numbers
Nodes have limited battery life
Nodes have low computational power
Nodes have small data storage
3
Sensor Networks
Base station
A
s1
s0
Background
Thousands of small devices with sensors
communicating wirelessly
4
WSN Application








Background
Civil structural monitoring
Habitat/ecosystem monitoring
Environmental monitoring
Smart homes
Chemical Detection
Traffic/Vehicle Monitoring
Human Health Monitoring
Homeland Security
5
QUIZ

What are the limited resources in
WSN?
1.
Energy, memory, and computation.
2.
Energy, communication, and memory.
3.
Computation, communication, and
memory.
Background
QUIZ WINNER IS…

Who is it?
Overview

Background.

The Wormhole Attack on WSN.


BANAID.
Conclusion.
8
Routing Tree
Wormhole Attack
Adapted from Chris Karlof and 9
David Wagner's WSNPA slides
Routing
Wormhole Attack
Adapted from Chris Karlof and 10
David Wagner's WSNPA slides
Wormhole Attack


Tunnel packets
received in one place
of the network and
replay them in
another place
The attacker can
have no key material.
All it requires is two
transceivers and one
high quality out-ofband channel
Wormhole Attack
Adapted from Chris Karlof and 11
David Wagner's WSNPA slides
Disrupted Routing


Most packets will be
routed to the
wormhole
The wormhole can
drop packets or more
subtly, selectively
forward packets to
avoid detection
Wormhole Attack
Adapted from Chris Karlof and 12
David Wagner's WSNPA slides
Overview

Background.
The Wormhole Attack on WSN.

BANAID.

Conclusion.

13
BANAID

BANAID is composed
of:




7 Mica2 sensors.
2 Stargates.
The topology is
assumed to be fixed.
Each sensor knows
its neighbors.
BANAID
14
BANAID

Three programs have
been written and
installed:



BANAID
TOSBase program
(sensor 5, and 6).
Stargate program
(stargate 1, and 2).
Simple customized AODV
program (sensor 1,2,3
and 4).
15
BANAID


Timing mechanism is
required to detect
Wormhole attack[1].
The average
transmission delay in
each sensor is ≈45
msec (Td ≈ 45msec)
[2].
BANAID
16
BANAID


Delay on the real
path:
Ns * Td.
3 * Td.
Delay on the fake
path:
Ns * Td.
2 * Td
BANAID
17
Overview




Background.
The Wormhole Attack on WSN.
BANAID.
Conclusion.
18
Conclusion



Wormhole attack is a significant danger to
routing protocols WSN.
BANAID implemented one of the Wormhole
attack’s solutions for WSN which is Packet
Leaches [1].
The destination is able to detect the fake
packet if the difference in time stamp is < (Ns
* Td) where Ns is the number of
sensors/hops between source and destination
in the real path.
19
QUIZ

What is the function of TOSBase?
1.
Initiates Wi-Fi connection
2.
Exchange packets with other Mica2
3.
4.
Forwards packets received from radio
antenna to serial port and vice versa.
Exchange routing information.
QUIZ WINNER IS…

Who is it?
References
[1] Hu, Y., Perrig, A., & Johnson, D.B. “Packet Leashes: A Defense against
Wormhole Attacks in Wireless Ad Hoc Networks,” Proceedings of the
Twenty-Second Annual Joint Conference of the IEEE Computer and
Communications Societies (INFOCOM 2003), vol. 3, pp. 1976-1986,
IEEE, San Francisco, CA, April 2003.
[2] Paek, J., Chintalapudi, K., & Govindan, R.“A Wireless Sensor Network
for Structural Health Monitoring: Performance and Experience”2005.
[3] Crossbow Technology, Inc., MPR/MIB Mote Hardware Users Manual,
http://www.xbow.com/Support/Support_pdf_files/MPRMIB_Series_Users_Manual.pdf
[4] Crossbow Technology, Inc., Stargate Developer’s Manual,
http://www.xbow.com/Support/Support_pdf_files/Stargate_Manual.pdf
22
Thank you
Questions?
23
Node Hardware
1Kbps - 1Mbps,
3-100 Meters,
128KB-1MB
Limited Storage
Transceiver
Memory
8-bit, 10 MHz
Embedded
Processor
Slow Computations
Sensors
Battery
Limited Lifetime
BANAID
24
Mica2




Back
BANAID
[3]
Extremely popular mote
8-bit Atmega128 microcontroller
FSK radio
TinyOS.
25
Stargate




Back
BANAID
[4]
400 MHz processor.
Linux.
Wi-Fi compact flash
card.
MICA2 connector.
26