Implementación del ataque Wormhole en redes de sensores inalámbricos con dispositivos XBee S2C

dc.contributor.authorRamírez Gómez, Juliánspa
dc.contributor.authorVargas Montoya, Héctor Fernandospa
dc.contributor.authorLeón Henao, Álvarospa
dc.contributor.googlescholarVargas Montoya, Héctor Fernando [FTQurlcAAAAJ]spa
dc.contributor.orcidRamírez Gómez, Julián [0000-0003-1773-322X]spa
dc.contributor.orcidVargas Montoya, Héctor Fernando [0000-0002-0861-2883]spa
dc.contributor.orcidLeón Henao, Álvaro [0000-0002-7022-0944]spa
dc.contributor.researchgateVargas Montoya, Héctor Fernando [0000-0002-0861-2883]spa
dc.date.accessioned2020-10-27T00:19:58Z
dc.date.available2020-10-27T00:19:58Z
dc.date.issued2019-05-28
dc.description.abstractUna de las amenazas más peligrosas para las redes de sensores inalámbricos (WSN) son los ataques Wormholedebido a su capacidad de manipular datos de enrutamiento y aplicaciones en tiempo real y causar daños importantes a la integridad, disponibilidad y confidencialidad de los datos de una red. En este trabajo, se adopta un método empírico para lanzar un ataque de este tipo (que tiene éxito) en dispositivos IEEE 802.15.4/Zigbee con enrutamiento de origen habilitado, con ello encontrar formas para detectar ataques de tipo Wormholeen entornos reales. Se utiliza el framework KillerBeecon algoritmos para la manipulación de paquetes en un nodo malicioso, para capturar e inyectar paquetes maliciosos en los nodos víctimas. Además, se presenta y ejecuta una variante inversa del ataque Wormhole.Para evidenciar la realización de esta amenaza por parte del software atacante, el marco experimental incluye nodos XBee S2C. Los resultados incluyen recomendaciones, firmas de detección y trabajo futuro para enfrentar los ataquesWormholeque involucran protocolos de enrutamiento de fuentes como DSR.spa
dc.description.abstractenglishOne of the most dangerous threats to Wireless Sensor Networks (WSN) are wormhole attacks, due to their capacity to manipulate routing and application data in real time and cause important damages to the integrity, availability, and confidentiality of network data. An empirical method to launch a successful attack on IEEE 802.15.4/Zigbee devices with source routing enabled is adopted in this work to find signatures for detecting wormhole attacks in real environments. It uses the KillerBee framework with algorithms for packet manipulation through a malicious node to capture and inject malicious packets in victim nodes. Besides, a reverse variant of wormhole attack is presented and executed. To evidence the realization of this threat by the attacking software, the experimental framework includes XBee S2C nodes. The results include recommendations, detection signatures and future work to face wormhole attacks involving source routing protocols like DSR.eng
dc.format.mimetypeapplication/pdfspa
dc.format.mimetypeText/htmlspa
dc.identifier.doi10.29375/25392115.3606
dc.identifier.instnameinstname:Universidad Autónoma de Bucaramanga UNABspa
dc.identifier.issn2539-2115
dc.identifier.issn1657-2831
dc.identifier.repourlrepourl:https://repository.unab.edu.co
dc.identifier.urihttp://hdl.handle.net/20.500.12749/8831
dc.language.isoengspa
dc.language.isospaspa
dc.publisherUniversidad Autónoma de Bucaramanga UNAB
dc.relationhttps://revistas.unab.edu.co/index.php/rcc/article/view/3606/3030
dc.relationHttps://revistas.unab.edu.co/index.php/rcc/article/view/3606/3006
dc.relation.referencesAmish, P., & Vaghela, V. B. (2016). Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol. Procedia Computer Science, 79, 700–707. https://doi.org/10.1016/j.procs.2016.03.092
dc.relation.referencesAnwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., & Qureshi, K. N. (2014). Security Issues and Attacks in Wireless Sensor Network. World Applied Sciences Journal, 30(10), 1224–1227. https://doi.org/10.5829/ idosi.wasj.2014.30.10.334
dc.relation.referencesBhagat, S., & Panse, T. (2016). A detection and prevention of wormhole attack in homogeneous Wireless sensor Network. In 2016 International Conference on ICT in Business Industry & Government (ICTBIG) (pp. 1–6). IEEE. https://doi.org/10.1109/ICTBIG.2016.7892696
dc.relation.referencesForster, A. (2016). Introduction to Wireless Sensor Networks. John Wiley & Sons.
dc.relation.referencesGaware, A., & Dhonde, S. B. (2016). A Survey on Security Attacks in Wireless Sensor Networks. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 536–539).
dc.relation.referencesGoyal, S., Bhatia, T., & Verma, A. K. (2015). Wormhole and Sybil attack in WSN: A review. In 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom) (pp.1463– 1468).
dc.relation.referencesInternational Organization for Standardization. (2013). ISO/IEC 27001:2013. Retrieved January 17, 2019, from https://www.iso.org/obp/ui/#iso:std:iso-iec:27001:ed-2:v1:en
dc.relation.referencesIoannou, C., & Vassiliou, V. (2016). The Impact of Network Layer Attacks in Wireless Sensor Networks. In 2016 International Workshop on Secure Internet of Things (SIoT) (pp. 20–28). IEEE. https://doi.org/10.1109/ SIoT.2016.009
dc.relation.referencesJao, M.-H., Hsieh, M.-H., He, K.-H., Liu, D.-H., Kuo, S.-Y., Chu, T.-H., & Chou, Y.-H. (2015). A Wormhole Attacks Detection Using a QTS Algorithm with MA in WSN. In 2015 IEEE International Conference on Systems, Man, and Cybernetics (pp. 20–25). IEEE. https://doi.org/10.1109/SMC.2015.17
dc.relation.referencesJohnson, D. B. (2003). The dynamic source routing protocol for mobile ad hoc networks (DSR).
dc.relation.referencesMarian, S., & Mircea, P. (2015). Sybil attack type detection in Wireless Sensor networks based on received signal strength indicator detection scheme. In 2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (pp. 121–124). IEEE. https://doi.org/10.1109/ SACI.2015.7208183
dc.relation.referencesPatel, A., Patel, N., & Patel, R. (2015). Defending against Wormhole Attack in MANET. In 2015 Fifth International Conference on Communication Systems and Network Technologies (pp. 674–678). IEEE. https://doi. org/10.1109/CSNT.2015.253
dc.relation.referencesPatle, A., & Gupta, N. (2016). Vulnerabilities, attack effect and different security scheme in WSN: A survey. In 2016 International Conference on ICT in Business Industry & Government (ICTBIG) (pp. 1–6). IEEE. https:// doi.org/10.1109/ICTBIG.2016.7892724
dc.relation.referencesPurohit, R., & Sidhu, N. (2015). Wireless sensor network: Routing protocols and attacks- a survey. In 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 2130– 2135).
dc.relation.referencesQazi, S., Raad, R., Mu, Y., & Susilo, W. (2013). Securing DSR against wormhole attacks in multirate ad hoc networks. Journal of Network and Computer Applications, 36(2), 582–592. https://doi.org/10.1016/j. jnca.2012.12.019
dc.relation.referencesRani, A., & Kumar, S. (2017). A survey of security in wireless sensor networks. In 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT) (pp. 1–5). IEEE. https://doi. org/10.1109/CIACT.2017.7977334
dc.relation.referencesSahmim, S., & Gharsellaoui, H. (2017). Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: a review. Procedia Computer Science, 112, 1516–1522. https://doi. org/10.1016/j.procs.2017.08.050
dc.relation.referencesTomic, I., & McCann, J. A. (2017). A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols. IEEE Internet of Things Journal, 4(6), 1910–1923. https://doi.org/10.1109/JIOT.2017.2749883
dc.relation.referencesYang, S.-H. (2014). Wireless Sensor Networks. Principles, Design and Applications. London: Springer London. https://doi.org/10.1007/978-1-4471-5505-8
dc.relation.referencesYih-Chun Hu, Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), 370–380. https://doi.org/10.1109/JSAC.2005.861394
dc.relation.referencesZheng, J., Qian, H., & Wang, L. (2015). Defense Technology of Wormhole Attacks Based on Node Connectivity. In 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity) (pp. 421–425). IEEE. https://doi.org/10.1109/SmartCity.2015.107
dc.relation.referencesZhu, C., Leung, V. C. M., Shu, L., & Ngai, E. C.-H. (2015). Green Internet of Things for Smart World. IEEE Access, 3, 2151–2162. https://doi.org/10.1109/ACCESS.2015.2497312
dc.relation.referencesZigbee Alliance. (2014). Standards: ZigBee Specification. Retrieved January 17, 2019, from https://www.zigbee.org/ download/standards-zigbee-specification/
dc.relation.urihttps://revistas.unab.edu.co/index.php/rcc/article/view/3606
dc.rightsDerechos de autor 2019 Revista Colombiana de Computación
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.creativecommonsAttribution-NonCommercial-ShareAlike 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.5/co/
dc.sourceRevista Colombiana de Computación; Vol. 20 Núm. 1 (2019): Revista Colombiana de Computación; 41-58
dc.subjectWormhole attack
dc.subjectZigBee
dc.subjectIoT
dc.subjectCiberseguridad
dc.subjectDSR
dc.subject.keywordsWormhole attackeng
dc.subject.keywordsZigBeeeng
dc.subject.keywordsIoTeng
dc.subject.keywordsCybersecurityeng
dc.subject.keywordsDSReng
dc.subject.keywordsTechnological innovationsspa
dc.subject.keywordsTechnological developmenteng
dc.subject.keywordsSystems engineereng
dc.subject.keywordsResearcheng
dc.subject.lembInnovaciones tecnológicasspa
dc.subject.lembDesarrollo tecnológicospa
dc.subject.lembIngeniero de sistemasspa
dc.subject.lembTecnología de la información y comunicaciónspa
dc.subject.proposalAtaque de agujero de gusanospa
dc.subject.proposalZigBeespa
dc.subject.proposalInternet de las cosasspa
dc.subject.proposalSeguridad cibernéticaspa
dc.subject.proposalDSRspa
dc.titleImplementación del ataque Wormhole en redes de sensores inalámbricos con dispositivos XBee S2Cspa
dc.title.translatedImplementing a Wormhole Attack on Wireless Sensor Networks with XBee S2C Deviceseng
dc.type.coarhttp://purl.org/coar/resource_type/c_7a1f
dc.type.driverinfo:eu-repo/semantics/article
dc.type.hasversionInfo:eu-repo/semantics/publishedVersion
dc.type.hasversioninfo:eu-repo/semantics/acceptedVersion
dc.type.localArtículospa
dc.type.redcolhttp://purl.org/redcol/resource_type/CJournalArticle

Archivos

Bloque original

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
2019_Articulo_Implementación del ataque Wormhole en redes de sensores inalambricos con dispositivos XBee S2C.pdf
Tamaño:
1.29 MB
Formato:
Adobe Portable Document Format
Descripción:
Artículo