Research of wireless injection attacks based on TinyOS

Xiaoliang Zhu, Yunfang Chen
{"title":"Research of wireless injection attacks based on TinyOS","authors":"Xiaoliang Zhu, Yunfang Chen","doi":"10.1109/CECNET.2013.6703385","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks face information disclosure, information tampering, replay attacks and other threats. For wireless sensor networks in the objective conditions, this paper proposes a wireless injection attack based on the TinyOS operating system comparable to Man-in-the-middle attack, and designs a set of schemes on injection attack by hardware node platform and TinyOS platform. The results show that it successfully injects false data into the normal wireless communications in wireless sensor networks, resulting in terminal receives fake data.","PeriodicalId":427418,"journal":{"name":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 3rd International Conference on Consumer Electronics, Communications and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CECNET.2013.6703385","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Wireless sensor networks face information disclosure, information tampering, replay attacks and other threats. For wireless sensor networks in the objective conditions, this paper proposes a wireless injection attack based on the TinyOS operating system comparable to Man-in-the-middle attack, and designs a set of schemes on injection attack by hardware node platform and TinyOS platform. The results show that it successfully injects false data into the normal wireless communications in wireless sensor networks, resulting in terminal receives fake data.
基于TinyOS的无线注入攻击研究
无线传感器网络面临信息泄露、信息篡改、重放攻击等威胁。针对客观条件下的无线传感器网络,本文提出了一种类似于中间人攻击的基于TinyOS操作系统的无线注入攻击,并设计了一套基于硬件节点平台和TinyOS平台的注入攻击方案。结果表明,该方法成功地将假数据注入到无线传感器网络的正常无线通信中,导致终端接收到假数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信