Build–Launch–Consolidate Framework and Toolkit for Impact Analysis on Wireless Sensor Networks
Abstract
:1. Introduction
- The framework provides a systematic approach to conducting experiments by enabling the user to run simulations on Cooja using a replicable setup of node types and their precise position.
- The framework can be used to establish a more accurate understanding of different attacks on WSNs and their impact by considering different attack scenarios, network topologies, and attacker placements.
- Additionally, BLC automatically collects three popular metrics to measure the performance of the network, namely, the Packet Delivery Ratio (PDR), End-to-End (E2E) delay, and Power Consumption (PC). It can also be expanded to accommodate additional metrics with proper configuration.
2. Related Work
2.1. Performance Analysis Considering Attack Scenarios, Placements, and Network Layouts
2.2. Approaches and Tools for Analyzing WSNs’ Performance
3. Framework Overview
3.1. Builder
3.2. Launcher
3.3. Consolidator
4. Case Study: Analyzing Flooding Attack
4.1. Flooding Attack
4.2. Simulation Environment
4.3. Results and Analysis
4.3.1. Impact on Packet Delivery Ratio
4.3.2. Impact on End-to-End Delay
4.3.3. Impact on Power Consumption
5. Conclusions and Future Works
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Lata, S.; Mehfuz, S.; Urooj, S. Secure and Reliable WSN for Internet of Things: Challenges and Enabling Technologies. IEEE Access 2021, 9, 161103–161128. [Google Scholar] [CrossRef]
- Muzammal, S.M.; Murugesan, R.K.; Jhanjhi, N.Z. A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-based Approaches. IEEE Internet Things J. 2020, 4662, 4186–4210. [Google Scholar] [CrossRef]
- Swessi, D.; Idoudi, H. A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures. Wirel. Pers. Comm. 2022, 124, 1557–1592. [Google Scholar] [CrossRef]
- Saravanan, G.; Parkhe, S.S.; Thakar, C.M.; Kulkarni, V.V.; Mishra, H.G.; Gulothungan, G. Implementation of IoT in production and manufacturing: An Industry 4.0 approach. Mater. Today Proc. 2022, 51, 2427–2430. [Google Scholar] [CrossRef]
- Azzedin, F.; Suwad, H.; Alyafeai, Z. Countermeasureing zero day attacks: Asset-based approach. In Proceedings of the 2017 International Conference on High Performance Computing & Simulation (HPCS), Genoa, Italy, 17–21 July 2017; pp. 854–857. [Google Scholar]
- Suwad, H.I.M.; Azzedin, F.A.M. Asset-Based Security Systems and Methods. U.S. Patent 11,347,843, 31 May 2022. [Google Scholar]
- Azzedin, F.; Suwad, H.; Rahman, M.M. An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks. Comput. Mater. Contin. 2022, 73, 3003–3020. [Google Scholar] [CrossRef]
- Azzedin, F.; Albinali, H. Security in internet of things: Rpl attacks taxonomy. In Proceedings of the 5th International Conference on Future Networks & Distributed Systems, Dubai, United Arab Emirates, 15–16 December 2021; pp. 820–825. [Google Scholar]
- Le, A.; Loo, J.; Lasebae, A.; Vinel, A.; Chen, Y.; Chai, M. The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sens. J. 2013, 13, 3685–3692. [Google Scholar] [CrossRef]
- Panda, N.; Supriya, M. Blackhole Attack Impact Analysis on Low Power Lossy Networks. In Proceedings of the 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT), Bangalore, India, 7–9 October 2022; pp. 1–5. [Google Scholar] [CrossRef]
- Tripathi, M.; Gaur, M.S.; Laxmi, V. Comparing the impact of black hole and gray hole attack on LEACH in WSN. Procedia Comput. Sci. 2013, 19, 1101–1107. [Google Scholar] [CrossRef]
- Iqbal, M.M.; Ahmed, A.; Khadam, U. Sinkhole Attack in Multi-sink Paradigm: Detection and Performance Evaluation in RPL based IoT. In Proceedings of the 2020 International Conference on Computing and Information Technology (ICCIT-1441), Tabuk, Saudi Arabia, 9–10 September 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Sun, X.; Wang, G.; Xu, L.; Yuan, H. Data replication techniques in the Internet of Things: A systematic literature review. Libr. Hi Tech 2021, 39, 1121–1136. [Google Scholar] [CrossRef]
- Argota Sánchez-Vaquerizo, J. Getting real: The challenge of building and validating a large-scale digital twin of Barcelona’s traffic with empirical data. ISPRS Int. J. Geo-Inf. 2022, 11, 24. [Google Scholar] [CrossRef]
- Osterlind, F.; Dunkels, A.; Eriksson, J.; Finne, N.; Voigt, T. Cross-Level Sensor Network Simulation with COOJA. In Proceedings of the 2006 31st IEEE Conference on Local Computer Networks, Tampa, FL, USA, 14–16 November 2006; pp. 641–648. [Google Scholar] [CrossRef]
- Oikonomou, G.; Duquennoy, S.; Elsts, A.; Eriksson, J.; Tanaka, Y.; Tsiftes, N. The Contiki-NG open source operating system for next generation IoT devices. SoftwareX 2022, 18, 101089. [Google Scholar] [CrossRef]
- Alghofaili, R.I. Impact and ML-Based Detection of Denial-of-Service Attacks on Wireless Sensor Networks. Master’s Thesis, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia, 2023. [Google Scholar]
- Ramya, P.; Sairamvamsi, T. Impact Analysis of Blackhole, Flooding, and Grayhole Attacks and Security Enhancements in Mobile Ad Hoc Networks Using SHA3 Algorithm. In Lecture Notes in Electrical Engineering; Springer: Singapore, 2018; pp. 639–647. [Google Scholar] [CrossRef]
- Mayzaud, A.; Badonnel, R.; Chrisment, I. A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Trans. Netw. Serv. Manag. 2017, 14, 472–486. [Google Scholar] [CrossRef]
- Mayzaud, A. Monitoring and Security for the RPL-based Internet of Things. Ph.D. Thesis, The University of Lorraine, Lorraine, Grand Est region, France, 2016. [Google Scholar]
- Arış, A.; Örs Yalçın, S.B.; Oktuğ, S.F. New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw. 2019, 85, 81–91. [Google Scholar] [CrossRef]
- Hachemi, F.E.; Mana, M.; Bensaber, B.A. Study of the Impact of Sinkhole Attack in IoT Using Shewhart Control Charts. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Rai, K.K.; Asawa, K. Impact analysis of rank attack with spoofed IP on routing in 6LoWPAN network. In Proceedings of the 2017 Tenth International Conference on Contemporary Computing (IC3), Noida, India, 10–12 August 2017; pp. 1–5. [Google Scholar] [CrossRef]
- Kulau, U.; Müller, S.; Schildt, S.; Büsching, F.; Wolf, L. Investigation & Mitigation of the Energy Efficiency Impact of Node Resets in RPL. Ad Hoc Netw. 2021, 114, 102417. [Google Scholar] [CrossRef]
- Finne, N.; Eriksson, J.; Voigt, T.; Suciu, G.; Sachian, M.A.; Ko, J.; Keipour, H. Multi-trace: Multi-level data trace generation with the cooja simulator. In Proceedings of the 2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS), Pafos, Cyprus, 14–16 July 2021; pp. 390–395. [Google Scholar]
- Violettas, G.; Simoglou, G.; Petridou, S.; Mamatas, L. A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks. Future Gener. Comput. Syst. 2021, 125, 698–714. [Google Scholar] [CrossRef]
- Jabba, D.; Acevedo, P. ViTool-BC: Visualization Tool Based on Cooja Simulator for WSN. Appl. Sci. 2021, 11, 7665. [Google Scholar] [CrossRef]
- Bocchino, S.; Fedor, S.; Petracca, M. Pyfuns: A python framework for ubiquitous networked sensors. In Lecture Notes in Computer Science, Wireless Sensor Networks, EWSN 2015, Porto, Portugal, 9–11 February 2015; Springer: Cham, Switzerland, 2015; pp. 1–18. [Google Scholar] [CrossRef]
- Theodorou, T.; Violettas, G.; Valsamas, P.; Petridou, S.; Mamatas, L. A Multi-Protocol Software-Defined Networking Solution for the Internet of Things. IEEE Commun. Mag. 2019, 57, 42–48. [Google Scholar] [CrossRef]
- Dunkels, A.; Osterlind, F.; Tsiftes, N.; He, Z. Software-Based on-Line Energy Estimation for Sensor Nodes. In Proceedings of the 4th Workshop on Embedded Networked Sensors, New York, NY, USA, 25–26 June 2007; EmNets ’07. pp. 28–32. [Google Scholar] [CrossRef]
- Texas Instruments CC2420 Datasheet. Texas Instruments. 2024. Available online: https://www.ti.com/product/CC2420 (accessed on 10 December 2023).
- Gaddour, O.; Koubâa, A. RPL in a nutshell: A survey. Comput. Netw. 2012, 56, 3163–3178. [Google Scholar] [CrossRef]
- Alexander, R.; Brandt, A.; Vasseur, J.P.; Hui, J.; Pister, K.; Thubert, P.; Levis, P.; Struik, R.; Kelsey, R.; Winter, T. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. 2012. Available online: https://www.rfc-editor.org/info/rfc6550 (accessed on 10 December 2023).
- Medjek, F.; Tandjaoui, D.; Djedjig, N.; Romdhani, I. Multicast DIS attack mitigation in RPL-based IoT-LLNs. J. Inf. Secur. Appl. 2021, 61, 102939. [Google Scholar] [CrossRef]
- Bokka, R.; Sadasivam, T. DIS flooding attack Impact on the Performance of RPL Based Internet of Things Networks: Analysis. In Proceedings of the 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 4–6 August 2021; pp. 1017–1022. [Google Scholar] [CrossRef]
- Banga, S.; Arora, H.; Sankhla, S.; Sharma, G.; Jain, B. Performance Analysis of Hello Flood Attack in WSN. In International Conference on Communication and Computational Technologies; Purohit, S.D., Singh Jat, D., Poonia, R.C., Kumar, S., Hiranwal, S., Eds.; Springer: Singapore, 2021; pp. 335–342. [Google Scholar]
- Almomani, I.; Al-Kasasbeh, B. Performance analysis of LEACH protocol under Denial of Service attacks. In Proceedings of the 2015 6th International Conference on Information and Communication Systems (ICICS), Amman, Jordan, 7–9 April 2015; pp. 292–297. [Google Scholar] [CrossRef]
Ref. | Studied Attacks | Attacker Placements | Network Layout | Performance Metrics |
---|---|---|---|---|
[11] | Blackhole, grayhole | Random position | Random | Control overhead, network lifetime, power consumption |
[18] | Blackhole, flooding, and grayhole | Mobile | Mobile | Network lifetime, power consumption, PDR, throughput |
[9] | Decreased rank | Each network node position | Grid | Control overhead, E2E delay, power consumption, throughput |
[19] | Version | Each network node position | Cluster-based, random, and grid | Scalability |
[21] | Version | Each network node position | Grid and random | Control overhead, E2E delay, power consumption, PDR |
[22] | Decreased rank | Three positions: close to the sink, in the middle, and at the network’s edge. | Tree | Control overhead |
[23] | Decreased rank | Multiple fixed positions | Grid | E2E delay, PDR |
[24] | Version and local repair | Fixed position | Binary tree and mesh | Power consumption |
Ref. | Tool | Base | Capabilities | Limitations |
---|---|---|---|---|
[25] | Multi-Trace | Cooja simulator | Multiple levels of data logging; generating multiple simulations from a single scenario. | Node placement and topology selections are not provided. |
[26] | ASSET | Cooja simulator | Real-time visualization of topology; provides 13 types of RPL attacks. | Manual node placement; summary results are not provided. |
[27] | ViTool-BC | Cooja simulator | Real-time visualization of network connections; heatmaps of energy consumption, and battery depletion. | Node placement and topology selections are not provided; PDR, latency, and control overhead are not reported. |
[28] | PyFUNS | Python and CoAP API | Allows multiple topologies and placements; and provides energy and latency metrics. | PDR and control overhead are not reported. |
[29] | MINOS | Not specified | Real-time visualization of network connections; provides PDR and control overhead. | Power consumption is not reported; the results are presented at the node level. |
# | Parameter | Value |
---|---|---|
1 | Number of motes | 34 + 1 Sink |
2 | Malicious motes | 0 or 1 |
3 | Mote type | Zolertia Z1 |
4 | Mote distribution | Binary or Grid |
5 | Tx and Rx success ratios | 1.0 |
6 | Duration | 30 Min |
Scenario | Binary | Grid | ||||
---|---|---|---|---|---|---|
Avg PDR (%) | Avg E2E (ms) | Avg PC (mW) | Avg PDR (%) | Avg E2E (ms) | Avg PC (mW) | |
Normal | 98% | 1027 | 0.52 | 96% | 1385 | 0.76 |
Flooding Attack | 79% | 1177 | 0.80 | 54% | 2389 | 1.67 |
Impact (%) | −19% | +15% | +55% | −44% | +72% | +120% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alghofaili, R.; Albinali, H.; Azzedin, F. Build–Launch–Consolidate Framework and Toolkit for Impact Analysis on Wireless Sensor Networks. J. Sens. Actuator Netw. 2024, 13, 17. https://doi.org/10.3390/jsan13010017
Alghofaili R, Albinali H, Azzedin F. Build–Launch–Consolidate Framework and Toolkit for Impact Analysis on Wireless Sensor Networks. Journal of Sensor and Actuator Networks. 2024; 13(1):17. https://doi.org/10.3390/jsan13010017
Chicago/Turabian StyleAlghofaili, Rakan, Hussah Albinali, and Farag Azzedin. 2024. "Build–Launch–Consolidate Framework and Toolkit for Impact Analysis on Wireless Sensor Networks" Journal of Sensor and Actuator Networks 13, no. 1: 17. https://doi.org/10.3390/jsan13010017
APA StyleAlghofaili, R., Albinali, H., & Azzedin, F. (2024). Build–Launch–Consolidate Framework and Toolkit for Impact Analysis on Wireless Sensor Networks. Journal of Sensor and Actuator Networks, 13(1), 17. https://doi.org/10.3390/jsan13010017