2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP) (2015)
Dec. 12, 2015 to Dec. 14, 2015
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/PAAP.2015.51
Although wireless sensor networks are widely used in recent years, it remains a big security risk in the transmission of information and energy consumption of the nodes. By summarizing the existing wireless sensor networks attack measures, this paper proposes a way to attack wireless sensor networks by wireless injection, at different times fake nodes is disguised as acquisition nodes and transmission nodes, passing a lot of fake information to other nodes, and it results in the excessive energy consumption of the transmission nodes. In the component-based development Tiny OS system, we use the Micaz nodes to carry out the attack experiments and performance evaluation. Experiment results show that this method achieves the results. It is that the transmission delay will be significantly with more attack nodes and longer attack period, and it also verifies the insufficient performance of wireless sensor networks nodes.
Wireless sensor networks, Protocols, Wireless communication, Delays, Energy consumption, Base stations, Switching circuits
L. Qiu, W. Jiang, W. Zhang and P. Li, "Wireless Injection Attacks Based on Fake Data Injection in TinyOS," 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), Nanjing, China, 2015, pp. 236-242.