90 research outputs found

    A New IEEE 802.15.4 Simulation Model for OMNeT++ / INET

    Full text link
    This paper introduces a new IEEE 802.15.4 simulation model for OMNeT++ / INET. 802.15.4 is an important underlying standard for wireless sensor networks and Internet of Things scenarios. The presented implementation is designed to be compatible with OMNeT++ 4.x and INET 2.x and laid-out to be expandable for newer revisions of the 802.15.4 standard. The source code is available online https://github.com/michaelkirsche/IEEE802154INET-StandaloneComment: Published in: A. F\"orster, C. Sommer, T. Steinbach, M. W\"ahlisch (Eds.), Proc. of 1st OMNeT++ Community Summit, Hamburg, Germany, September 2, 2014, arXiv:1409.0093, 201

    Exploração de Covert Channels de Rede sobre comunicações IEEE 802.15.4

    Get PDF
    The advancements in information and communication technology in the past decades have been converging into a new communication paradigm in which everything is expected to be interconnected with the heightened pervasiveness and ubiquity of the Internet of Things (IoT) paradigm. As these technologies mature, they are increasingly finding its way into more sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount. While the number of deployed IoT devices continues to increase annually, up to tens of billions of connected devices, IoT devices continue to present severe cyber-security vulnerabilities, which are worsened by challenges such as scalability, heterogeneity, and their often scarce computing capacity. Network covert channels are increasingly being used to support malware with stealthy behaviours, aiming at exfiltrating data or to orchestrate nodes of a botnet in a cloaked fashion. Nevertheless, the attention to this problem regarding underlying and pervasive IoT protocols such as the IEEE 802.15.4 has been scarce. Therefore, in this Thesis, we aim at analysing the performance and feasibility of such covertchannel implementations upon the IEEE 802.15.4 protocol to support the development of new mechanisms and add-ons that can effectively contribute to improve the current state of-art of IoT systems which rely on such, or similar underlying communication technologies.Os avanços nas tecnologias de informação e comunicação nas últimas décadas têm convergido num novo paradigma de comunicação, onde se espera que todos os intervenientes estejam interconectados pela ubiquidade do paradigma da Internet of Things (Internet das Coisas). Com a maturação destas tecnologias, elas têm-se vindo a infiltrar em domínios cada vez mais sensíveis, como nas aplicações médicas e industriais, onde a confiabilidade da informação e cyber-segurança são um fator crítico. Num contexto onde o número de dispositivos IoT continua a aumentar anualmente, já na ordem das dezenas de biliões de dispositivos interconectados, estes continuam, contudo, a apresentar severas vulnerabilidades no campo da cyber-segurança, sendo que os desafios como a escalabilidade, heterogeneidade e, na maioria das vezes, a sua baixa capacidade de processamento, tornam ainda mais complexa a sua resolução de forma permanente. Os covert channels de rede são cada vez mais um meio de suporte a malwares que apresentam comportamentos furtivos, almejando a extração de informação sensível ou a orquestração de nós de uma botnet de uma forma camuflada. Contudo, a atenção dada a este problema em protocolos de rede IoT abrangentes como o IEEE 802.15.4, tem sido escassa. Portanto, nesta tese, pretende-se elaborar uma análise da performance e da viabilidade da implementação de covert channels em modelos de rede onde figura o protocolo IEEE 802.15.4 de forma a suportar o desenvolvimento de novos mecanismos e complementos que podem efetivamente contribuir para melhorar a ciber-segurança de sistemas IoT que dependem do suporte destas tecnologias de comunicação

    Solutions and Tools for Secure Communication in Wireless Sensor Networks

    Get PDF
    Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of security material, and effective prevention and reaction against security threats and attacks. However, WSNs are mainly composed of resource-constrained devices. That is, network nodes feature reduced capabilities, especially in terms of memory storage, computing power, transmission rate, and energy availability. As a consequence, assuring secure communication in WSNs results to be more difficult than in other kinds of network. In fact, trading effectiveness of adopted solutions with their efficiency becomes far more important. In addition, specific device classes or technologies may require to design ad hoc security solutions. Also, it is necessary to efficiently manage security material, and dynamically cope with changes of security requirements. Finally, security threats and countermeasures have to be carefully considered since from the network design phase. This Ph.D. dissertion considers secure communication in WSNs, and provides the following contributions. First, we provide a performance evaluation of IEEE 802.15.4 security services. Then, we focus on the ZigBee technology and its security services, and propose possible solutions to some deficiencies and inefficiencies. Second, we present HISS, a highly scalable and efficient key management scheme, able to contrast collusion attacks while displaying a graceful degradation of performance. Third, we present STaR, a software component for WSNs that secures multiple traffic flows at the same time. It is transparent to the application, and provides runtime reconfigurability, thus coping with dynamic changes of security requirements. Finally, we describe ASF, our attack simulation framework for WSNs. Such a tool helps network designers to quantitatively evaluate effects of security attacks, produce an attack ranking based on their severity, and thus select the most appropriate countermeasures

    Simulation of a sensor network embedded in rail train

    Get PDF
    Wireless communications are becoming more and more important in our world. Wireless communication is an alternative to wire communications, often more expensive to deploy due to the extensive number of cables. In some location, it is simply not possible to deploy cables and wireless communications come up handy reducing by far the expenses. We can also see the part of wireless communications in our day to day life, from cellular phone, to computer wifi and even headphones. One of the other ways to use wireless communications is through sensor networks. Sensors are small devices with small transmission range and low energy consumption. Sensors can be used in environmental monitoring, for example to monitor temperature in a forest and, this way, prevent the apparition of fires. The standard protocol 802.15.4 defines a physical layer and a MAC layer which are well suited to be used in sensor network such as LR-WPAN (Low Rate Wireless Personal Area Network). This project will focus on the simulation of a sensor network using 802.15.4 protocol deployed on train wheels. Those sensors would be able to retrieve information as temperature or vibration values and transmit them to a more powerful computer able to treat that information. First of all, I will rapidly describe some simulators which could be used to perform the simulation. By the study of some characteristics, a choice will be drawn. Then, to ensure the reliability of the simulator, a set of tests will be conducted and the results obtained will be compared to theoretical ones. Finally, the last part will deal with the simulation of the sensor network on the train. I will explain the protocol itself and then perform some tests of energy consumption and throughpu

    Performance Analysis of IEEE 802.15.4 Bootstrap Process

    Get PDF
    The IEEE 802.15.4 is a popular standard used in wireless sensor networks (WSNs) and the Internet of Things (IoT) applications. In these networks, devices are organized into groups formally known as personal area networks (PAN) which require a bootstrap procedure to become operational. Bootstrap plays a key role in the initialization and maintenance of these networks. For this reason, this work presents our implementation and performance analysis for the ns-3 network simulator. Specifically, this bootstrap implementation includes the support of three types of scanning mechanisms (energy scan, passive scan, and active scan) and the complete classic association mechanism described by the standard. Both of these mechanisms can be used independently by higher layers protocols to support network initialization, network joining, and maintenance tasks. Performance evaluation is conducted in total network association time and packet overhead terms. Our source code is documented and publicly available in the latest ns-3 official release

    IETF standardization in the field of the Internet of Things (IoT): a survey

    Get PDF
    Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there have been many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working groups. This is complemented with a broad overview of related research results that illustrate how this work can be extended or used to tackle other problems and with a discussion on open issues and challenges. As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world of Internet-connected objects, pointing to future research opportunities

    Routing algorithms for wireless sensor : networks based on the duty cycle of its components

    Get PDF
    [eng] Wireless sensor network is one of the most important topics in the current data transferring. In fact regarding to data gathering and transformation, cost effective is the top topic and optimum point, which every vendors and sector are focusing on it. In the field of petrochemical regarding sensitive processes could not stay out of this scope and start to monitor the gas pipes and processes over the wireless fashion. Therefore some items should have been taking into considerations such as: instant monitoring, nonstop characteristic, long term investing and energy consuming. According to those aforesaid items, we have planned to do an investigation and find the feasibly of how we can to create and distribute a network to have accuracy to measurement , sending data reliability, having long term network life cycle and having minimum energy consuming. Therefore the only technology could help us was IEEE 802.15.4 with mixed of microcontrollers and transceivers, able to manipulate to reach out our objects in maximizing lifetime and minimizing latency in wsn, as an unique routing algorithm in Mobile ad Hoc Network. WSN in fact is a relatively new section of networking technology and nowadays is more popular. The reason of these advantages instead of others is low-power microcontroller and inexpensive sensor usage for any communications and also simple sensor designing. Regarding to network layers, Physical layer for WSN based on IEEE802.15.4 is fundamental of frames and packets transactions. So two main devices which are involving in this project: transceivers such as CC2520 and CC3200 ZigBee/IEEE 802.15.4 RF, managed by microcontrollers. Common controller for those transceivers such as MSP430F1611 16-bit MSP430 family for Texas instrument in the nodes and coordinators ideas were selected. One step more close to the idea, was other layer so called Link layer or in other hand MAC layer. Another advantage of WSN is ability to manipulate MAC layer, because modifications in lower layer always has low Energy consuming than other layers. Therefore according to these circumstances, MAC protocols are able to energy efficiency, also reduce and achieve to zero based of unused time in WSN. So any WSN, energy wasting could be control in MAC sub layer and even though MAC protocols. Other layer in WSN is declared as a Network layer, the logical way which those packets could be find the best way and shortest path in minimum time as possible and reachability to the main point based on node and coordinator. Nodes are programmed in upper layer and have been matched with MAC layer, now it's time to join and stick the frames in a packet and involving to each other. Meanwhile we decided to create a middle layer through MAC and Network layer to play as a bridge, mainly called VRT (Variable Response Time) and FRT (Fixed Response Time) to control the energy consumption in the process of routing in network layer. This algorithm is cooperating with MAC layer in sleep and wake up modes, in fact with VRT, nodes just received their needs and captured the vital packet in wake up mode, sends back the answer, now the task is finished and both sided transaction is done. After that, it's not need to have more listening and capturing packets from the remote nodes as a coordinator therefore, left the transmission process to save more energy for further wireless communication stream in sleep mode. Also FRT is another algorithm in MAC layer, to decrease the energy consumption. This algorithm is switch based energy control, as a same concept in VRT in sleeping and wakeup mode. Finally we have design this algorithm in Simulator and real world. The results correlate quite well results showing as a good agreement between two worlds, also we have obtained better results in battery consumption over network life cycle to other business algorithms.[spa] En este trabajo nos focalizaremos en la minimización del consumo a partir de la minimización del número de transmisiones. Buscamos por tanto aquel algoritmo que nos permita aumentar la probabilidad de aciertos. Esta idea, diseñará el algoritmo de enrutamiento que mejor se ajusta a la red MANET. Una vez simulada la red se diseñará un "testbed" en donde una parte de la red se implementará de forma real, mediante la introducción de sensores inalámbricos y la otra parte se hará de forma simulada, a través de una interfaz que interconecta el mundo real con la simulación de Spyder. Se pretende ver que ambos mundos progresan de forma similar. Con respecto a la capa de OSI en WSN, sería prioritaria la capa física o capa de hardware, por este motivo nuestra proyecto también se centra en el tipo determinado de hardware que debe aplicarse para obtener resultados satisfactorios. Entonces tratamos las características de los dos hardwares, el transceiver y el microcontroller. También se trata en este apartado su concepto lógico de acuerdo con la ficha técnica oficial IEEE802.15.4. La segunda prioridad de la capa OSI se centra en el Medium Access Control (MAC) de la capa. En esta capa nuestro objetivo se logrará mediante la manipulación de las addresses MAC. Los protocolos MAC deben estar orientados a la reducción del consumo de energía y también a la reducción del tiempo no utilizado en WSN, para ello aplicamos algunas políticas para controlar los comportamientos del tráfico en esta capa para cambiar el consumo de energía, la vida útil de la red y evitar el gasto innecesario de recursos, en realidad concentramos a nuestro algoritmo VRT y FRT. Respecto de la idea principal, de controlar los sensores para aumentar la vida útil de la red y disminuir el consumo de energía. En realidad se explica cómo controlar la capa MAC y forzar el hardware para lograr el objetivo principal de este proyecto. De hecho podemos decir que mejoramos el reenvío de paquetes entre los sensores intermedios, buscando el promedio de distancia HOP más corta desde el origen al destino, así como la disminución del consumo de energía en cada sensor

    Analysis of the IEEE 802.15.4a ultra wideband physical layer through wireless sensor network simulations in OMNET++

    Get PDF
    Wireless Sensor Networks are the main representative of pervasive computing in large-scale physical environments. These networks consist of a large number of small, wireless devices embedded in the physical world to be used for surveillance, environmental monitoring or other data capture, processing and transfer applications. Ultra wideband has emerged as one of the newest and most promising concepts for wireless technology. Considering all its advantages it seems a likely communication technology candidate for future wireless sensor networks. This paper considers the viability of ultra wideband technology in wireless sensor networks by employing an IEEE 802.15.4a low-rate ultra wideband physical layer model in the OMNET++ simulation environment. An elaborate investigation into the inner workings of the IEEE 802.15.4a UWB physical layer is performed. Simulation experiments are used to provide a detailed analysis of the performance of the IEEE 802.15.4a UWB physical layer over several communication distances. A proposal for a cognitive, adaptive communication approach to optimize for speed and distance is also presented. AFRIKAANS : Draadlose Sensor Netwerke is die hoof verteenwoordiger vir deurdringende rekenarisering in groot skaal fisiese omgewings. Hierdie tipe netwerke bestaan uit ’n groot aantal klein, draadlose apparate wat in die fisiese wêreld ingesluit word vir die doel van bewaking, omgewings monitering en vele ander data opvang, verwerk en oordrag applikasies. Ultra wyeband het opgestaan as een van die nuutste en mees belowend konsepte vir draadlose kommunikasie tegnologie. As al die voordele van dié kommunikasie tegnologie in ag geneem word, blyk dit om ’n baie goeie kandidaat te wees vir gebruik in toekomstige draadlose sensor netwerke. Hierdie verhandeling oorweeg die vatbaarheid van die gebruik van die ultra wyeband tegnologie in draadlose sensor netwerke deur ’n IEEE 802.15.4a lae-tempo ultra wyeband fisiese laag model in die OMNET++ simulasie omgewing toe te pas. ’n Breedvoerige ondersoek word geloots om die fyn binneste werking van die IEEE 802.15.4a UWB fisiese laag te verstaan. Simulasie eksperimente word gebruik om ’n meer gedetaileerde analiese omtrent die werkverrigting van die IEEE 802.15.4a UWB fisiese laag te verkry oor verskillende kommunikasie afstande. ’n Voorstel vir ’n omgewings bewuste, aanpasbare kommunikasie tegniek word bespreek met die doel om die spoed en afstand van kommunikasie te optimiseer.Dissertation (MEng)--University of Pretoria, 2011.Electrical, Electronic and Computer Engineeringunrestricte

    Energy-aware medium access control protocols for wireless sensors network applications

    Get PDF
    The main purpose of this thesis was to investigate energy efficient Medium Access Control (MAC) protocols designed to extend the lifetime of a wireless sensor network application, such as tracking, environment monitoring, home security, patient monitoring, e.g., foetal monitoring in the last weeks of pregnancy. From the perspective of communication protocols, energy efficiency is one of the most important issues, and can be addressed at each layer of the protocol stack; however, our research only focuses on the medium access control (MAC) layer. An energy efficient MAC protocol was designed based on modifications and optimisations for a synchronized power saving Sensor MAC (SMAC) protocol, which has three important components: periodic listen and sleep, collision and overhearing avoidance and message passing. The Sensor Block Acknowledgement (SBACK) MAC protocol is proposed, which combines contention-based, scheduling-based and block acknowledgement-based schemes to achieve energy efficiency. In SBACK, the use of ACK control packets is reduced since it will not have an ACK packet for every DATA packet sent; instead, one special packet called Block ACK Response will be used at the end of the transmission of all data packets. This packet informs the sender of how many packets were received by the receiver, reducing the number of ACK control packets we intended to reduce the power consumption for the nodes. Hence more useful data packets can be transmitted. A comparison study between SBACK and SMAC protocol is also performed. Considering 0% of packet losses, SBACK decreases the energy consumption when directly compared with S-MAC, we will have always a decrease of energy consumption. Three different transceivers will be used and considering a packet loss of 10% we will have a decrease of energy consumption between 10% and 0.1% depending on the transceiver. When there are no retransmissions of packets, SBACK only achieve worst performance when the number of fragments is less than 12, after that the decrease of average delay increases with the increase of the fragments sent. When 10% of the packets need retransmission only for the TR1000 transceiver worst results occurs in terms of energy waste, all other transceivers (CC2420 and AT86RF230) achieve better results. In terms of delay if we need to retransmit more than 10 packets the SBACK protocol always achieves better performance when comparing with the other MAC protocols that uses ACK
    • …
    corecore