Implementation of Information Systems Security Threats: The Byzantine Generals and Wormhole Attacks
Abstract
A challenge in designing wireless sensor networks is to maximize the lifetime of the network with respect to limited resources and energy. These limitations make the network particularly vulnerable to attacks from adversaries. Attacks such as wormhole attack and Byzantine General Attack, that are considered damaging to the security of the information system of the network. In this paper we implemented those two attacks on different network settings and topologies to test how it affects the information that is being spread in the network in the presence of these attacks. We use Matlab simulation and our results show the differences between the between different topologies on the stability of the information of the network.
Â
Keywords
Full Text:
PDFReferences
R. A. F. Mini, B. Nath, and A. A. F. Loureiro, "A probabilistic approach to predict the energy consumption in wireless sensor network," In IV Workshop ," In IV Workshop on Wireless Communication and Mobile Computing, Seo Paulo, Brazil, October 23-25 2002.
D. Dong, Y. Liu, X. Li, and X. Liao, "Topological detection on wormholes in wireless ad hoc and sensor networks," IEEE Transactions on Networking, vol. 19, 2011.
J. Kim, D. Sterne, R. Hardy, R. K. Thomas, and L. Tong, "Timing- based localization of in-band wormhole tunnels in manets," in ACM WiSec, 2010.
S. R. D. R. Maheshwari, J. Gao, "Detecting wormhole attacks in wireless networks using connectivity information," in IEEE INFOCOMM, 2007.
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Wormhole attacks in wireless networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, 2006.
S. Dolev, "Gossiping in a multichannel radio network: An oblivious approach to malicious interference"., DISC, 2007.
Amitanand , "BAR Fault Tolerance for Cooperative Services", SOSP 2005.
N. Alrajei, G. Corser, H Fu, Y. Zhu "Energy Prediction Based Intrusion Detection in Wireless Sensor Networks," International Journal of Emerging Technology and Advanced Engineering (IJETAE, ISSN 2250-2459 Online, ISO 9001:2008 Certified Journal) Volume 4, Issue 3, March 2014.x
N. Alrajei, H Fu, Y. Zhu "Information Theory based Intruder Detection in Sensor Networks", Journal of Communications Technology, Electronics and Computer Science, Volume 5, pp11-21, ISSN: 2457-905X, 2016
N. Alrajei, H Fu, Y.Zhu "A Survey on Fault Tolerance in Wireless Sensor Networks" , 2014 American Society For Engineering Education North Central Section Conference ASEE NCS Conference April 4 and 5, 2014
Yourong Xu et al, "Distributed Wormhole Attack Detection in Wireless Sensor Networks", CIP 2007.
DOI: http://dx.doi.org/10.22385/jctecs.v16i0.255