• JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
 
  Bookmark and Share
 
 
Master's Dissertation
DOI
https://doi.org/10.11606/D.3.2024.tde-23052024-080357
Document
Author
Full name
Daniel Francis Soriano
E-mail
Institute/School/College
Knowledge Area
Date of Defense
Published
São Paulo, 2024
Supervisor
Committee
Ruggiero, Wilson Vicente (President)
Néto, João Carlos
Okamoto Junior, Jun
Title in Portuguese
Detecção e mitigação de ataques de interrupção de tráfego em redes de sensores sem fio com RPL.
Keywords in Portuguese
Redes de computadores
Segurança de redes
Sensor
Abstract in Portuguese
Redes de sensores sem fio tem como objetivo o monitoramento de vários aspectos dos ambientes onde são instaladas. Os nós de sensoriamento transmitem os dados coletados do ambiente pelos n´os vizinhos até que sejam entregues ao sorvedouro para registro e contabilização. Existem diversos ataques que podem interromper, total ou parcialmente, a coleta desses dados pelo sorvedouro, como blackhole, sinkhole e gray hole/selective forwarding. Este trabalho apresenta um framework de camada de aplicação para redes de sensores sem fio (RSSF) baseadas em RPL, que detecta e mitiga ataques de interrupção de tráfego de dados, ao mesmo tempo em que informa o sorvedouro (e os gestores da rede) sobre os n´os suspeitos usando uma rota alternativa, evitando assim a interceptação e/ou interrupção pelos atacantes. A reação local faz com que os nós afetados releguem os atacantes a nós folhas, impedindo-os de atuarem como roteadores, efetivamente mitigando os ataques. Ao concentrar a função de monitoramento ao sorvedouro, os gestores da rede conseguem identificar os nós comprometidos, e com isso removê-los fisicamente da rede. Os experimentos realizados mostram que o framework proposto superou os trabalhos encontrados na literatura quanto a taxa de entrega de pacotes, e manteve a taxa de perda de pacotes próxima de 2% ou inferior na maioria dos cenários testados. Além disso, também conseguiu manter um baixo overhead de mensagem de controle (4,67% em cenário sem ataque e 9,74% em cenário com ataque). Ao mesmo tempo, foi também capaz de fornecer aos gestores da rede informações sobre a localização dos invasores.
Title in English
Untitled in english
Keywords in English
Blackhole
Grayhole
LLN
Packet drop
RPL
Selective forwarding
Sinkhole
Traffic blocking
Traffic interruption
WSN
Abstract in English
Wireless Sensor Networks (WSN) aim to monitor various aspects of the environment in which they are deployed. Sensor nodes collect and send environment data by neighboring nodes until it reaches the gateway node (root node). WSNs are susceptible to several attacks that totally or partially interrupt the data flow, such as sinkhole, blackhole, gray hole/selective forwarding. We here present an application layer framework for RPL-based WSNs that detect and mitigate the attacks that interrupt data traffic while informing the root node (and the network maintainers) of the suspect nodes by alternative routes, thus preventing interception and/or interruption by attackers. The attacker nodes are then relegated to leaf-nodes by the local reaction of legitimate nodes, as they are prevented from acting as routers, effectively mitigating attacks. By concentrating monitoring functions on the sink, network managers can identify compromised nodes, which can lead to their physical removal. The experiments carried out show that the proposed framework surpassed the works found in the literature in terms of packet delivery rate, and that our framework kept the package loss rate at about 2% or lower in most scenarios tested. At the same time, it also managed to mantain a low control message overhead (i.e., 4.67% in no attack scenario and 9,74% under attack). Moreover, it was able to provide the network managers with information about the location of the attackers.
 
WARNING - Viewing this document is conditioned on your acceptance of the following terms of use:
This document is only for private use for research and teaching activities. Reproduction for commercial use is forbidden. This rights cover the whole data about this document as well as its contents. Any uses or copies of this document in whole or in part must include the author's name.
Publishing Date
2024-05-27
 
WARNING: Learn what derived works are clicking here.
All rights of the thesis/dissertation are from the authors
CeTI-SC/STI
Digital Library of Theses and Dissertations of USP. Copyright © 2001-2024. All rights reserved.