Simulator for analysis cyber threats to RFID based system

The paper addresses the issues of attacks in cyberspace from the local perspective of computer network and IoT devices of RFID based office system. The rapid development in IT technology has constantly brought out revolutionary changes in the area of office services. The very promising technology for automatic identification is RFID that has changed the manual scenario of office tasks to computerized automated services. However, RFID based systems are vulnerable to various cyberattacks, from simple passive eavesdropping to well-known denial of service (DoS). One of the methods for the analysis of threats is computer modelling and simulation. M&S gives the possibility of quantitative and qualitative analysis as well as forecasting. As a part of the work, the original Java-based discrete simulation package has been developed. The simulation model and relevant software was implemented to simulate DoS attack on a protected server in restricted access administrative office. In contrast to most of existing simulation tools in the field of cyberspace, the simulation package has been designed to model and simulate heterogeneous devices which behaviours might be modified by programming Groovy/Python scripts.

[1]  Gabriele D'Angelo,et al.  Modeling the Internet of Things: a simulation perspective , 2017, 2017 International Conference on High Performance Computing & Simulation (HPCS).

[2]  Andrzej Najgebauer,et al.  Agent-Based M&S of Smart Sensors for Knowledge Acquisition Inside the Internet of Things and Sensor Networks , 2015, ACIIDS.

[3]  Andrzej Najgebauer,et al.  SenseSim: An agent-based and discrete event simulator for Wireless Sensor Networks and the Internet of Things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[4]  Srinivas Sampalli,et al.  Technique for preventing DoS attacks on RFID systems , 2010, SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks.

[5]  Claus Heinrich,et al.  RFID and beyond - growing your business through real world awareness , 2005 .

[6]  Waszkowski Robert,et al.  Business processes in the RFID-equipped restricted access administrative office , 2016 .

[7]  Robert Waszkowski,et al.  Simulator for testing hardware and software of the office system with RFID tags , 2017 .

[8]  Mikko Sallinen,et al.  Survey of Wireless Sensor Networks Simulation Tools for Demanding Applications , 2009, 2009 Fifth International Conference on Networking and Services.

[9]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[10]  Andrzej Najgebauer,et al.  Augmented perception using Internet of Things , 2014 .

[11]  Antanas Cenys,et al.  Composite Dos Attack Model , 2012 .

[12]  Maciej Kiedrowicz Multi-faceted methodology of the risk analysis and management referring to the IT system supporting the processing of documents at different levels of sensitivity , 2017 .

[13]  Ke'ahi Cooper,et al.  Security for the Internet of Things , 2015 .

[14]  Maciej Kiedrowicz,et al.  Selected aspects of risk management in respect of security of the document lifecycle management system with multiple levels of sensitivity , 2015 .

[15]  Dariusz Pierzchała Application of Ontology and Rough Set Theory to Information Sharing in Multi-resolution Combat M&S , 2014 .

[16]  Robert Waszkowski,et al.  Optimization of the Document Placement in the RFID Cabinet , 2016 .

[17]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[18]  M. Tahar Kechadi,et al.  CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool , 2014, SimuTools.