Standard
Implementing a broadcast storm attack on a mission-critical wireless sensor network. / Krivtsova, Irina; Lebedev, Ilya; Sukhoparov, Mikhail; Bazhayev, Nurzhan; Zikratov, Igor; Ometov, Aleksandr; Andreev, Sergey; Masek, Pavel; Fujdiak, Radek; Hosek, Jiri.
Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings. ред. / Panagiotis Papadimitriou; Ibrahim Matta; Lefteris Mamatas; Yevgeni Koucheryavy. Springer Nature, 2016. стр. 297-308 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Том 9674).
Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › статья в сборнике материалов конференции › научная › Рецензирование
Harvard
Krivtsova, I
, Lebedev, I, Sukhoparov, M, Bazhayev, N, Zikratov, I, Ometov, A
, Andreev, S, Masek, P, Fujdiak, R & Hosek, J 2016,
Implementing a broadcast storm attack on a mission-critical wireless sensor network. в P Papadimitriou, I Matta, L Mamatas & Y Koucheryavy (ред.),
Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Том. 9674, Springer Nature, стр. 297-308, 14th IFIP WG 6.2 International Conference on Wired/Wireless Internet Communications, WWIC 2016, Thessaloniki, Греция,
25/05/16.
https://doi.org/10.1007/978-3-319-33936-8_23
APA
Krivtsova, I.
, Lebedev, I., Sukhoparov, M., Bazhayev, N., Zikratov, I., Ometov, A.
, Andreev, S., Masek, P., Fujdiak, R., & Hosek, J. (2016).
Implementing a broadcast storm attack on a mission-critical wireless sensor network. в P. Papadimitriou, I. Matta, L. Mamatas, & Y. Koucheryavy (Ред.),
Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings (стр. 297-308). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Том 9674). Springer Nature.
https://doi.org/10.1007/978-3-319-33936-8_23
Vancouver
Krivtsova I
, Lebedev I, Sukhoparov M, Bazhayev N, Zikratov I, Ometov A и пр.
Implementing a broadcast storm attack on a mission-critical wireless sensor network. в Papadimitriou P, Matta I, Mamatas L, Koucheryavy Y, Редакторы, Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings. Springer Nature. 2016. стр. 297-308. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
https://doi.org/10.1007/978-3-319-33936-8_23
Author
Krivtsova, Irina
; Lebedev, Ilya ; Sukhoparov, Mikhail ; Bazhayev, Nurzhan ; Zikratov, Igor ; Ometov, Aleksandr
; Andreev, Sergey ; Masek, Pavel ; Fujdiak, Radek ; Hosek, Jiri. /
Implementing a broadcast storm attack on a mission-critical wireless sensor network. Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings. Редактор / Panagiotis Papadimitriou ; Ibrahim Matta ; Lefteris Mamatas ; Yevgeni Koucheryavy. Springer Nature, 2016. стр. 297-308 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
BibTeX
@inproceedings{346fa3e87e604f949020095b480489be,
title = "Implementing a broadcast storm attack on a mission-critical wireless sensor network",
abstract = "In this work, we emphasize the practical importance of mission-critical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.",
keywords = "Ad hoc networks, Device availability, Information security, Multi-agent systems, Prototyping, Vulnerability",
author = "Irina Krivtsova and Ilya Lebedev and Mikhail Sukhoparov and Nurzhan Bazhayev and Igor Zikratov and Aleksandr Ometov and Sergey Andreev and Pavel Masek and Radek Fujdiak and Jiri Hosek",
year = "2016",
month = jan,
day = "1",
doi = "10.1007/978-3-319-33936-8_23",
language = "English",
isbn = "9783319339351",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Nature",
pages = "297--308",
editor = "Panagiotis Papadimitriou and Ibrahim Matta and Lefteris Mamatas and Yevgeni Koucheryavy",
booktitle = "Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings",
address = "Germany",
note = "14th IFIP WG 6.2 International Conference on Wired/Wireless Internet Communications, WWIC 2016 ; Conference date: 25-05-2016 Through 27-05-2016",
}
RIS
TY - GEN
T1 - Implementing a broadcast storm attack on a mission-critical wireless sensor network
AU - Krivtsova, Irina
AU - Lebedev, Ilya
AU - Sukhoparov, Mikhail
AU - Bazhayev, Nurzhan
AU - Zikratov, Igor
AU - Ometov, Aleksandr
AU - Andreev, Sergey
AU - Masek, Pavel
AU - Fujdiak, Radek
AU - Hosek, Jiri
PY - 2016/1/1
Y1 - 2016/1/1
N2 - In this work, we emphasize the practical importance of mission-critical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.
AB - In this work, we emphasize the practical importance of mission-critical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.
KW - Ad hoc networks
KW - Device availability
KW - Information security
KW - Multi-agent systems
KW - Prototyping
KW - Vulnerability
UR - http://www.scopus.com/inward/record.url?scp=84979030733&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-33936-8_23
DO - 10.1007/978-3-319-33936-8_23
M3 - Conference contribution
AN - SCOPUS:84979030733
SN - 9783319339351
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 297
EP - 308
BT - Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings
A2 - Papadimitriou, Panagiotis
A2 - Matta, Ibrahim
A2 - Mamatas, Lefteris
A2 - Koucheryavy, Yevgeni
PB - Springer Nature
T2 - 14th IFIP WG 6.2 International Conference on Wired/Wireless Internet Communications, WWIC 2016
Y2 - 25 May 2016 through 27 May 2016
ER -