Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks

Athanasios Giannetsos, Dimitriou Tassos, Neeli R. Prasad

Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review


The pervasive interconnection of autonomous sensor devices has given birth to a broad class of exciting new applications. At the same time, however, the unattended nature and the limited resources of sensor nodes have created an equal number of vulnerabilities that attackers can exploit in order to gain access in the network and the information transferred within. While much work has been done on trying to defend these networks, little has been done on suggesting sophisticated tools for proving how vulnerable sensor networks are. This work demonstrates a tool that allows both passive monitoring of transactional data in sensor networks, such as message rate, mote frequency, message routing, etc., but also discharge of various attacks against them. To the best of our knowledge, this is the first instance of an attack tool that can be used by an adversary to penetrate the confidentiality and functionality of a sensor network. Results show that our tool can be flexibly applied to different sensor network operating systems and protocol stacks giving an adversary privileges to which she is not entitled to. We hope that our tool will be used proactively, to study the weaknesses of new security protocols, and, hopefully, to enhance the level of security provided by these solutions even further.
TitelBlackhat Europe 2010, Digital Self Defense
Publikationsdato12 apr. 2010
StatusUdgivet - 12 apr. 2010
BegivenhedBlack Hat ® Technical Security Conference: Europe 2010 - Barcelona, Spanien
Varighed: 12 apr. 201115 apr. 2011


KonferenceBlack Hat ® Technical Security Conference: Europe 2010

Fingeraftryk Dyk ned i forskningsemnerne om 'Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks'. Sammen danner de et unikt fingeraftryk.