Next Article in Journal
Virtual Distances Methodology as Verification Technique for AACMMs with a Capacitive Sensor Based Indexed Metrology Platform
Next Article in Special Issue
Reciprocally-Benefited Secure Transmission for Spectrum Sensing-Based Cognitive Radio Sensor Networks
Previous Article in Journal
The Development of a Gas–Liquid Two-Phase Flow Sensor Applicable to CBM Wellbore Annulus
Previous Article in Special Issue
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
Open AccessArticle

Simulation of Attacks for Security in Wireless Sensor Network

Microelectronics Engineering Group, University of Cantabria, 39011 Cantabria, Spain
*
Author to whom correspondence should be addressed.
Academic Editors: Ignacio Bravo, Esther Palomar, Alfredo Gardel and José Luis Lázaro
Sensors 2016, 16(11), 1932; https://doi.org/10.3390/s16111932
Received: 24 August 2016 / Revised: 3 November 2016 / Accepted: 9 November 2016 / Published: 18 November 2016
(This article belongs to the Special Issue Trusted and Secure Wireless Sensor Network Designs and Deployments)
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. View Full-Text
Keywords: WSN; attack simulation; power consumption; security analysis WSN; attack simulation; power consumption; security analysis
Show Figures

Figure 1

MDPI and ACS Style

Diaz, A.; Sanchez, P. Simulation of Attacks for Security in Wireless Sensor Network. Sensors 2016, 16, 1932.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop