Revista Colombiana de Computación (May 2019)

Implementing a Wormhole Attack on Wireless Sensor Networks with XBee S2C Devices

  • Julián Ramírez Gómez,
  • Héctor Fernando Vargas Montoya,
  • Álvaro León Henao

DOI
https://doi.org/10.29375/25392115.3606
Journal volume & issue
Vol. 20, no. 1
pp. 41 – 58

Abstract

Read online

One of the most dangerous threats to Wireless Sensor Networks (WSN) are wormhole attacks, due to their capacity to manipulate routing and application data in real time and cause important damages to the integrity, availability, and confidentiality of network data. An empirical method to launch a successful attack on IEEE 802.15.4/Zigbee devices with source routing enabled is adopted in this work to find signatures for detecting wormhole attacks in real environments. It uses the KillerBee framework with algorithms for packet manipulation through a malicious node to capture and inject malicious packets in victim nodes. Besides, a reverse variant of wormhole attack is presented and executed. To evidence the realization of this threat by the attacking software, the experimental framework includes XBee S2C nodes. The results include recommendations, detection signatures and future work to face wormhole attacks involving source routing protocols like DSR.

Keywords