Standard

Implementing a broadcast storm attack on a mission-critical wireless sensor network. / Krivtsova, Irina; Lebedev, Ilya; Sukhoparov, Mikhail; Bazhayev, Nurzhan; Zikratov, Igor; Ometov, Aleksandr; Andreev, Sergey; Masek, Pavel; Fujdiak, Radek; Hosek, Jiri.

Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings. ред. / Panagiotis Papadimitriou; Ibrahim Matta; Lefteris Mamatas; Yevgeni Koucheryavy. Springer Nature, 2016. стр. 297-308 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Том 9674).

Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференцийстатья в сборнике материалов конференциинаучнаяРецензирование

Harvard

Krivtsova, I, Lebedev, I, Sukhoparov, M, Bazhayev, N, Zikratov, I, Ometov, A, Andreev, S, Masek, P, Fujdiak, R & Hosek, J 2016, Implementing a broadcast storm attack on a mission-critical wireless sensor network. в P Papadimitriou, I Matta, L Mamatas & Y Koucheryavy (ред.), Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Том. 9674, Springer Nature, стр. 297-308, 14th IFIP WG 6.2 International Conference on Wired/Wireless Internet Communications, WWIC 2016, Thessaloniki, Греция, 25/05/16. https://doi.org/10.1007/978-3-319-33936-8_23

APA

Krivtsova, I., Lebedev, I., Sukhoparov, M., Bazhayev, N., Zikratov, I., Ometov, A., Andreev, S., Masek, P., Fujdiak, R., & Hosek, J. (2016). Implementing a broadcast storm attack on a mission-critical wireless sensor network. в P. Papadimitriou, I. Matta, L. Mamatas, & Y. Koucheryavy (Ред.), Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings (стр. 297-308). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Том 9674). Springer Nature. https://doi.org/10.1007/978-3-319-33936-8_23

Vancouver

Krivtsova I, Lebedev I, Sukhoparov M, Bazhayev N, Zikratov I, Ometov A и пр. Implementing a broadcast storm attack on a mission-critical wireless sensor network. в Papadimitriou P, Matta I, Mamatas L, Koucheryavy Y, Редакторы, Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings. Springer Nature. 2016. стр. 297-308. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-33936-8_23

Author

Krivtsova, Irina ; Lebedev, Ilya ; Sukhoparov, Mikhail ; Bazhayev, Nurzhan ; Zikratov, Igor ; Ometov, Aleksandr ; Andreev, Sergey ; Masek, Pavel ; Fujdiak, Radek ; Hosek, Jiri. / Implementing a broadcast storm attack on a mission-critical wireless sensor network. Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings. Редактор / Panagiotis Papadimitriou ; Ibrahim Matta ; Lefteris Mamatas ; Yevgeni Koucheryavy. Springer Nature, 2016. стр. 297-308 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

BibTeX

@inproceedings{346fa3e87e604f949020095b480489be,
title = "Implementing a broadcast storm attack on a mission-critical wireless sensor network",
abstract = "In this work, we emphasize the practical importance of mission-critical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.",
keywords = "Ad hoc networks, Device availability, Information security, Multi-agent systems, Prototyping, Vulnerability",
author = "Irina Krivtsova and Ilya Lebedev and Mikhail Sukhoparov and Nurzhan Bazhayev and Igor Zikratov and Aleksandr Ometov and Sergey Andreev and Pavel Masek and Radek Fujdiak and Jiri Hosek",
year = "2016",
month = jan,
day = "1",
doi = "10.1007/978-3-319-33936-8_23",
language = "English",
isbn = "9783319339351",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Nature",
pages = "297--308",
editor = "Panagiotis Papadimitriou and Ibrahim Matta and Lefteris Mamatas and Yevgeni Koucheryavy",
booktitle = "Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings",
address = "Germany",
note = "14th IFIP WG 6.2 International Conference on Wired/Wireless Internet Communications, WWIC 2016 ; Conference date: 25-05-2016 Through 27-05-2016",

}

RIS

TY - GEN

T1 - Implementing a broadcast storm attack on a mission-critical wireless sensor network

AU - Krivtsova, Irina

AU - Lebedev, Ilya

AU - Sukhoparov, Mikhail

AU - Bazhayev, Nurzhan

AU - Zikratov, Igor

AU - Ometov, Aleksandr

AU - Andreev, Sergey

AU - Masek, Pavel

AU - Fujdiak, Radek

AU - Hosek, Jiri

PY - 2016/1/1

Y1 - 2016/1/1

N2 - In this work, we emphasize the practical importance of mission-critical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.

AB - In this work, we emphasize the practical importance of mission-critical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.

KW - Ad hoc networks

KW - Device availability

KW - Information security

KW - Multi-agent systems

KW - Prototyping

KW - Vulnerability

UR - http://www.scopus.com/inward/record.url?scp=84979030733&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-33936-8_23

DO - 10.1007/978-3-319-33936-8_23

M3 - Conference contribution

AN - SCOPUS:84979030733

SN - 9783319339351

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 297

EP - 308

BT - Wired/Wireless Internet Communications - 14th IFIP WG 6.2 International Conference, WWIC 2016, Proceedings

A2 - Papadimitriou, Panagiotis

A2 - Matta, Ibrahim

A2 - Mamatas, Lefteris

A2 - Koucheryavy, Yevgeni

PB - Springer Nature

T2 - 14th IFIP WG 6.2 International Conference on Wired/Wireless Internet Communications, WWIC 2016

Y2 - 25 May 2016 through 27 May 2016

ER -

ID: 53920136