{"title":"无线传感器网络攻击实现模型","authors":"Victoria M. Korzhuk, I. Krivtsova, Ilya Shilov","doi":"10.23919/FRUCT.2017.8071310","DOIUrl":null,"url":null,"abstract":"The article presents a method of wireless sensor network attacks modelling. The main ways of attack committing are briefly described. The existing modelling environments are analysed to select the most appropriate tools for model creating. In order to simplify software implementation of the model of attacks on the ZigBee wireless sensor network, the main parameters of the packet transmission at the physical layer for different frequency bands and signal modulation schemes in accordance with the standard IEEE 802.15.4 are calculated. Based on these data, the basic assumptions and limitations for the model are introduced. A software model of implementation of the various attacks on integrity and availability in wireless sensor networks based on OMNeT++ simulator is realized. Two topologies: mesh network and cluster tree are presented. For each topology its own addressing scheme and routing is provided: AODV for mesh network and domain addressing for the clustered tree. The experiment connected with the count of all packets and route packets in consecutive intervals is conducted. The described model may be used to obtain statistical information about the interactions in the wireless sensor network and about the attacks on such network.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The model of the attack implementation on wireless sensor networks\",\"authors\":\"Victoria M. Korzhuk, I. Krivtsova, Ilya Shilov\",\"doi\":\"10.23919/FRUCT.2017.8071310\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article presents a method of wireless sensor network attacks modelling. The main ways of attack committing are briefly described. The existing modelling environments are analysed to select the most appropriate tools for model creating. In order to simplify software implementation of the model of attacks on the ZigBee wireless sensor network, the main parameters of the packet transmission at the physical layer for different frequency bands and signal modulation schemes in accordance with the standard IEEE 802.15.4 are calculated. Based on these data, the basic assumptions and limitations for the model are introduced. A software model of implementation of the various attacks on integrity and availability in wireless sensor networks based on OMNeT++ simulator is realized. Two topologies: mesh network and cluster tree are presented. For each topology its own addressing scheme and routing is provided: AODV for mesh network and domain addressing for the clustered tree. The experiment connected with the count of all packets and route packets in consecutive intervals is conducted. The described model may be used to obtain statistical information about the interactions in the wireless sensor network and about the attacks on such network.\",\"PeriodicalId\":114353,\"journal\":{\"name\":\"2017 20th Conference of Open Innovations Association (FRUCT)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 20th Conference of Open Innovations Association (FRUCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/FRUCT.2017.8071310\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 20th Conference of Open Innovations Association (FRUCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/FRUCT.2017.8071310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The model of the attack implementation on wireless sensor networks
The article presents a method of wireless sensor network attacks modelling. The main ways of attack committing are briefly described. The existing modelling environments are analysed to select the most appropriate tools for model creating. In order to simplify software implementation of the model of attacks on the ZigBee wireless sensor network, the main parameters of the packet transmission at the physical layer for different frequency bands and signal modulation schemes in accordance with the standard IEEE 802.15.4 are calculated. Based on these data, the basic assumptions and limitations for the model are introduced. A software model of implementation of the various attacks on integrity and availability in wireless sensor networks based on OMNeT++ simulator is realized. Two topologies: mesh network and cluster tree are presented. For each topology its own addressing scheme and routing is provided: AODV for mesh network and domain addressing for the clustered tree. The experiment connected with the count of all packets and route packets in consecutive intervals is conducted. The described model may be used to obtain statistical information about the interactions in the wireless sensor network and about the attacks on such network.