Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks

The pervasive interconnection of autonomous sensor devices has given birth to a broad class of exciting new applications. At the same time, however, the unattended nature and the limited resources of sensor nodes have created an equal number of vulnerabilities that attackers can exploit in order to gain access in the network and the information transferred within. While much work has been done on trying to defend these networks, little has been done on suggesting sophisticated tools for proving how vulnerable sensor networks are. This work demonstrates a tool that allows both passive monitoring of transactional data in sensor networks, such as message rate, mote frequency, message routing, etc., but also discharge of various attacks against them. To the best of our knowledge, this is the first instance of an attack tool that can be used by an adversary to penetrate the confidentiality and functionality of a sensor network. Results show that our tool can be flexibly applied to different sensor network operating systems and protocol stacks giving an adversary privileges to which she is not entitled to. We hope that our tool will be used proactively, to study the weaknesses of new security protocols, and, hopefully, to enhance the level of security provided by these solutions even further.

[1]  David E. Culler,et al.  Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[2]  James Demmel,et al.  Wireless sensor networks for structural health monitoring , 2006, SenSys '06.

[3]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[4]  Felix C. Freiling,et al.  Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.

[5]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[6]  Tassos Dimitriou,et al.  Authenticated In-Network Programming for Wireless Sensor Networks , 2006, ADHOC-NOW.

[7]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[8]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[9]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[10]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[11]  Vlado Handziski,et al.  Flexible hardware abstraction of the TI MSP430 microcontroller in TinyOS , 2004, SenSys '04.

[12]  Anthony D. Joseph Sensor Networks, Wearable Computing, and Healthcare Applications , 2007 .

[13]  Ajay Gupta,et al.  Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.

[14]  Claude Castelluccia,et al.  Code injection attacks on harvard-architecture devices , 2008, CCS.

[15]  Ian D. Henning,et al.  Real World Issues in Deploying a Wireless Sensor Network , 2005 .

[16]  Jesús Favela,et al.  Sensor Networks, Wearable Computing, and Healthcare Applications , 2007, IEEE Pervasive Computing.

[17]  Jingsha He,et al.  Group-based intrusion detection system in wireless sensor networks , 2008, Comput. Commun..

[18]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[19]  Stephen B. Wicker,et al.  Transactional Confidentiality in Sensor Networks , 2008, IEEE Security & Privacy.