| Literature DB >> 27869710 |
Abstract
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.Entities:
Keywords: WSN; attack simulation; power consumption; security analysis
Year: 2016 PMID: 27869710 PMCID: PMC5134591 DOI: 10.3390/s16111932
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Survey of simulators.
| Simulator | Traffic Generation | Real SW Code Support | HW Platform | OS Support | Power Consumption | Security Measure | Limitations |
|---|---|---|---|---|---|---|---|
| NS-2 (The Network Simulator) | Traffic patterns | NO | NO | NO | YES | NO | No real traffic |
| NS-3 | Traffic patterns | NO | NO | NO | YES | NO | No real traffic |
| TOSSIM | Statically or Dynamically | Only TinyOS | NO | TinyOS | With PowerTOSSIM | NO | Only for TinyOS code |
| UWSim | Dynamically | NO | YES | NO | NO | NO | Only for Under Water networks |
| Avrora | Real | YES | Limited | NO | YES | NO | Only for Mica2 sensor nodes |
| Castalia | Real | YES | NO | NO | YES | NO | Not a sensor specific platform. |
| GloMoSim | Statistical | NO | NO | NO | NO | NO | Statistical traffic, no energy models |
| Shawn | Not real | NO | NO | NO | NO | NO | No real traffic |
| J-Sim | Not real | NO | NO | NO | YES | NO | Low efficiency. No real traffic |
| Prowler | Probabilistic | NO | MICA (AVR) Mote | TinyOS | NO | NO | Probabilistic traffic. |
| ATEMU | Real | YES | AVR processor based systems | TinyOS | YES | NO | Only for AVR processor based systems |
| OMNeT++ | Events | NO | YES With extension | NO | YES | NO | Slow. No real SW code |
| COOJA | Real | YES | YES | Contiki OS | YES | NO | Low efficiency. Limited number of simultaneous node types. |
| Proposed Simulator | Real | YES | YES | Multiple | YES | YES |
Figure 1Firmware-aware attack design.
Figure 2Scheme of Wireless Sensor Network virtual platform without attack model.
Figure 3Native/Host-compiled co-Simulation process in the WSN virtual platform.
Figure 4Wireless Network Model and packet-loss probability matrix.
Figure 5Normal network mode operation.
Relation between proposed attackers and real WSN attacks.
| Attack | Main Effect of the Attack | Attacker Used |
|---|---|---|
| Reduction of the network traffic (disrupts network functionality) | Link-Noise attacker | |
| Reduction of the network traffic (packet corruption) | Link-Noise attacker | |
| Reduction of the network traffic | Link-Noise attacker | |
| Reduction of the network traffic (attracting all the packets to the attacked node destination, and silently discarding or dropping them) | Link-Noise attacker | |
| Reduction of the network traffic | Link-Noise attacker | |
| Reduction of the network traffic (disable attacked nodes) | Link-Noise attacker | |
| Reduction of the network traffic | Link-Noise attacker | |
| Injects “RTS” packets into the network | Fake packet Injector attacker | |
| Injects fabricated reports | Fake packet Injector attacker | |
| Injects “Hello” packets | Fake packet Injector attacker | |
| Routes a packet to distant nodes | Fake packet Injector attacker | |
| Injects new connection requests | Fake packet Injector attacker | |
| Modification of the network routing (Removing some packets & injecting new packets) | Link + Injector attacker | |
| Modification of the network routing (Removing some packets & injecting new packets) | Link + Injector attacker | |
| Modification of the network routing (Removing attacked packets & injecting same packets into other destinations) | Link + Injector attacker | |
| Isolate some nodes and inject new fake packets (Removing some packets & injecting new packets) | Link + Injector attacker | |
| Overwhelm sensor nodes | Direct attacker | |
| Modification of the SW node | Direct attacker | |
| Information theft (no effects) where an adversary gains full control over the node | Not modeled | |
| Information theft (no effects) | Not modeled |
Figure 6Network mode operation for Link Noise Attackers.
Figure 7Simulation with Fake Packet Injection attackers.
Figure 8Meshed network example.
Figure 9Linear network model example.
Figure 10Circular network model example.
Energy consumption estimations for Linear Network.
| Linear Wireless Sensor Network Energy Consumption | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Node 0 | Node 1 | Node 2 | Node 3 | Node 4 | Node 5 | Node 6 | Node 7 | Gateway | Total | |
| 2.47 J | 2.47 J | 2.47 J | 2.47 J | 2.47 J | 2.47 J | 2.47 J | 2.47 J | 1.33 J | 21.11 J | |
| 0% | 0% | 0% | 0% | 0% | 0% | 0% | 55% | 89% | 12% | |
| 0% | 0% | 0% | 0% | 0% | 0% | 0% | 0% | 543% | 34% | |
| 0% | 0% | 77% | 326% | 38% | 0% | 0% | 0% | 0% | 45% | |
Energy Consumption estimations for Meshed Network.
| Meshed Wireless Sensor Network Energy Consumption | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Node 0 | Node 1 | Node 2 | Node 3 | Node 4 | Node 5 | Node 6 | Node 7 | Gateway | Total | |
| 1.91 J | 1.91 J | 1.91 J | 1.91 J | 1.91 J | 1.91 J | 1.91 J | 1.91 J | 9.18 J | 24.48 J | |
| 102% | 102% | 102% | 102% | 102% | 102% | 102% | 102% | 91% | 98% | |
| 0% | 0% | 0% | 0% | 0% | 0% | 0% | 0% | 28% | 11% | |
| 0% | 0% | 0% | 409% | 0% | 0% | 0% | 0% | 0% | 34% | |
Energy Consumption estimations for Circular Network.
| Circular Wireless Sensor Network Energy Consumption | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Node 0 | Node 1 | Node 2 | Node 3 | Node 4 | Node 5 | Node 6 | Node 7 | Gateway | Total | |
| 2.66 J | 2.66 J | 2.66 J | 2.66 J | 2.66 J | 2.66 J | 2.66 J | 2.66 J | 2.93 J | 24.21 J | |
| 0% | 0% | 0% | 0% | 0% | 0% | 0% | 0% | 86% | 10% | |
| 0% | 0% | 0% | 0% | 0% | 0% | 0% | 0% | 95% | 11% | |
| 0% | 0% | 41% | 189% | 0% | 43% | 0% | 0% | 0% | 30% | |
Figure 11Total Energy consumption.
Execution time of the simulator.
| Linear | Meshed | Circular | |
|---|---|---|---|
| not attacked | 43 s | 37 s | 45 s |
| Jamming | 40 s | 35 s | 44 s |
| Injection | 52 s | 44 s | 55 s |
| Jamming + Injection | 51 s | 42 s | 53 s |
Figure 12Network topology for accuracy evaluation.
Figure 13Firmware running under replication attack conditions.
Energy Consumption results.
| Attack | Node 1: Hardware Crypto + Attack Aware Firmware | Node 2: Software Crypto + Insecure Firmware |
|---|---|---|
| 2.02 mWh | 2.02 mWh | |
| 1.93 mWh | 4.48 mWh |
Real/Simulation Consumption Results for WSN.
| WSN under Attack | WSN without Attack | |||
|---|---|---|---|---|
| Node 1: Attack Aware Firmware | Node 2: Unsecure Firmware | Node 1: Attack Aware Firmware | Node 2: Unsecure Firmware | |
| 1.93 mWh | 4.48 mWh | 2.02 mWh | 2.02 mWh | |
| 2.01 mWh | 4.27 mWh | 2.17 mWh | 2.17 mWh | |