Wireless Injection Attacks Based on Fake Data Injection in TinyOS

Although wireless sensor networks are widely used in recent years, it remains a big security risk in the transmission of information and energy consumption of the nodes. By summarizing the existing wireless sensor networks attack measures, this paper proposes a way to attack wireless sensor networks by wireless injection, at different times fake nodes is disguised as acquisition nodes and transmission nodes, passing a lot of fake information to other nodes, and it results in the excessive energy consumption of the transmission nodes. In the component-based development Tiny OS system, we use the Micaz nodes to carry out the attack experiments and performance evaluation. Experiment results show that this method achieves the results. It is that the transmission delay will be significantly with more attack nodes and longer attack period, and it also verifies the insufficient performance of wireless sensor networks nodes.

[1]  Yunfang Chen,et al.  Research of wireless injection attacks based on TinyOS , 2013, 2013 3rd International Conference on Consumer Electronics, Communications and Networks.

[2]  藤岡 達也 「教育改革期」における地学教育の新たなる展開に向けて : "3^rd International Conference on Geoscience Education"と「21世紀の地学教育を考える大阪フォーラム」を中心に , 2002 .

[3]  Limin Sun,et al.  Advances in Wireless Sensor Networks , 2013, Communications in Computer and Information Science.

[4]  Fasee Ullah,et al.  Analysis of security protocols for Wireless Sensor Networks , 2011, 2011 3rd International Conference on Computer Research and Development.

[5]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[6]  Sipra Das Bit,et al.  Energy Saving Replay Attack Prevention in Clustered Wireless Sensor Networks , 2013, PAISI.

[7]  Ruchuan Wang,et al.  Advances in Wireless Sensor Networks , 2012, Communications in Computer and Information Science.

[8]  Ruchuan Wang,et al.  Research on Network Malicious Code Immune Based on Imbalanced Support Vector Machines , 2015 .

[9]  Li Xiao,et al.  The Evolution of MAC Protocols in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.