One of the most dangerous threats to Wireless Sensor Networks (WSN) are wormhole attacks due to their capacity to manipulate routing and application data in real time and cause important damages to the integrity, availability, and confidentiality of network data. In this work, an empirical method to launch such attack (which is successful) on IEEE 802.15.4/Zigbee devices with source routing enabled is adopted to find signatures for detecting wormhole attacks in real environments. It uses the KillerBee framework with algorithms for packet manipulation through a malicious node to capture and inject malicious packets in victim nodes. Besides, a reverse variant of wormhole attack is presented and executed. To evidence the realization of this threat by the attacking software, the experimental framework includes XBee S2C nodes. The results include recommendations, detection signatures and future work to face wormhole attacks involving source routing protocols like DSR.
CITATION STYLE
Gómez, J. R., Vargas Montoya, H. F., & Henao, A. L. (2018). Implementation of a wormhole attack on wireless sensor networks with XBee S2C devices. In Communications in Computer and Information Science (Vol. 885, pp. 98–112). Springer Verlag. https://doi.org/10.1007/978-3-319-98998-3_8
Mendeley helps you to discover research relevant for your work.