Cryptography Reference
In-Depth Information
interference could lead to a denial-of-service attack. The worst-case scenario in radio
interference is jamming.
2.2.2.3 Injection Attack
After the attacker has clandestinely intruded into the WSN network, he may imper-
sonate a few of the sensor nodes (or even sink nodes) and may inject malicious data
into the network. The malicious data might be false advertisement of neighbor-node
information to other nodes, leading to impersonation of sink nodes and aggregation
of all data.
2.2.2.4 Replay Attack
A replay attack is a common attack in WSN, whereby an attacker is able to intercept
user data and retransmit user data at a later time. This attack is particularly useful in
breaking weak authentication schemes, which do not consider the time stamp when
authenticating nodes. This attack is a lso useful during shared-key distribution processes.
2.2.2.5 Byzantine Attack
In a Byzantine attack, the outside adversary is able to take full control of a subset of
authenticated nodes that can be used to attack the network from inside. Such attacks
by malicious behavior are known as Byzantine attacks. Some examples of Byzantine
attacks are black holes, wormholes, flood rushing, and overlay network wormholes.
Black hole attacks: In this type of attack (Figure 2.3), the attacker drops packets
selectively, or all control and data packets that are routed through him. There-
fore, any packet routed through this intermediate malicious node will suffer
from partial or total data loss.
Flood rushing attack: This type of attack (Figure 2.4) is common to wireless net-
works and exploits the flood duplicate suppression technique. In this attack, the
attacker attempts to overthrow the existing routing path by sending a flood of
packets through an alternate route, which will result in discarding the legitimate
route and adopting the adversarial route. Usual authentication schemes cannot
prevent this attack, as the adversaries are authenticated nodes.
Wormhole attack: In this type of attack, two conniving sensor nodes, or lap-
tops, tunnel control and data packets between each other, with the intention
of creating a shortcut in the WSN. Such a low-latency tunnel between the two
conniving nodes will likely increase the probability of it being selected as an
active path. This type of attack is very closely related to the sinkhole attack,
because one of the conniving nodes could falsely advertise to be the sink node
Search WWH ::




Custom Search