An Analysis into Physical and Virtual Power Draw Characteristics of Embedded Wireless Sensor Network Devices under DoS and RPL-Based Attacks
Abstract
:1. Introduction
- Investigate the creation, compilation, and setup of multiple operating systems suited for a physical embedded system along with the creation of a standard measurement which will enable a comparison vector for the study;
- Demonstrate if operating systems differ in reaction to a selection of DoS attacks by analysing the results created from the study;
- Investigate and virtualise common attack concepts within RPL networks against WSN devices. This includes implementing three RPL-based attacks: rank attack, SYN flood attack, and version number attack;
- Investigate if the enlargement of a network increases the power draw of an RPL-based network attack by increasing the network size from 10 nodes to 13 and 16.
2. Related Work
3. Methodology: Operating System and Hardware Selection
3.1. Operating Systems
3.2. Hardware
3.3. Realistic Use Cases for Appropriate Baseline Power Consumption
4. Experimental Setup
4.1. Experiment 1: DoS Attacks in a Simulated Environment
- First, 9/10 motes are based on default RPL-compatible motes; these are Sky motes running Contiki-NG. These motes choose their own topology as they are utilising the RPL protocol. Hence, this can become a mesh or tree topology in the form of a destination-oriented acyclic-directed graph (DODAG). This corresponds to the simulation of a typical LoRa network;
- One mote is set up as a border router (IPv6), again using the default installation from the Contiki-NG package. Default values were used within the operating system for ease of use and deployment;
- Concurrent deployment of these motes within Cooja along with verification that they work correctly;
- Creation of a tun0 interface on the host OS ready to interface with the network edge mote;
- Initial ping of the border router from the host device through tun0-; when this is verified within Cooja, the experiments can start.
4.2. Experiment 2: DoS Attack on Physical Devices
- Tiny core Linux (as close as possible to a bare-bones Linux installation);
- Yocto OS (an IoT-based distribution that may fail to compile for Pi Zero);
- Raspberry Pi OS (a Debian-based distribution to provide a possible contrast);
- Buildroot embedded Linux (a backup option for Yocto OS);
- Kali Linux (a backup option for Tiny Core Linux);
- Temp monitoring script;
- Benchmarking software;
- Balena-Etcher ISO to bootable media converter;
- Hping3 package.
- A note of the device’s average core temperature is taken during normal operation and again during the attack to enable a vector of comparison between them;
- Power draw of the device during normal operation and under attack;
- Another PC intercepting network traffic and running Wireshark in mon0 mode.
4.3. Experiment 3: RPL-Based Attacks
- The network is set up with the majority of the motes being copies of a basic sensor with RPL capability;
- The motes are placed automatically, and randomly throughout the simulation with one root node and one malicious node;
- Before the attack is run, the option of creating a .pcap file is selected and the tracking of power consumption is enabled;
- The virtualisation of this network is commenced; it is run twice, once without the malicious node for a baseline, and once with the malicious node;
- When the attack is simulated successfully, it is stopped;
- The .pcap file is created and the measurements of the mote activity are collected: one before and one after the attack.
5. Results
5.1. Experiment 2
5.2. Experiment 3
6. Discussion of Results
6.1. Experiment 2
6.2. Experiment 3
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
CPU | Central Processing Unit |
DIO | DODAG Information Object |
DIS | DODAG Information Solicitation |
DoS | Denial of Service |
DODAG | Destination-Oriented Directed Acyclic Graph |
GPIO | General Purpose Input/Output |
GUI | Graphical User Interface |
ICMP | Internet Control Message Protocol |
IoT | Internet of Things |
OS | Operating System |
RPL | Routing Protocol for Low Power and Lossy Networks |
SCADA | Supervisory Control and Data Acquisition |
SD | Secure Digital |
SoC | System on Chip |
TCP | Transmission Control Protocol |
UAV | Unmanned Aerial Vehicle |
UDP | User Datagram Protocol |
USB | Universal Serial Bus |
WSN | Wireless Sensor Network |
References
- Sujay-Vailshery, L. Global Number of Connected IoT Devices 2015–2025, Statista. Available online: https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/ (accessed on 20 January 2023).
- Lamaazi, H.; Benamar, N. A comprehensive survey on enhancements and limitations of the RPL protocol: A focus on the objective function. Ad Hoc Netw. 2020, 96, 102001. [Google Scholar] [CrossRef]
- Lim, C. A survey on congestion control for RPL-based wireless sensor networks. Sensors 2019, 19, 2567. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Pancaroglu, D.; Sen, S. Load balancing for RPL-based Internet of Things: A review. Ad Hoc Netw. 2021, 116, 102491. [Google Scholar] [CrossRef]
- Verma, A.; Ranga, V. Security of RPL based 6LoWPAN networks in the Internet of things: A review. IEEE Sens. J. 2020, 20, 5666–5690. [Google Scholar] [CrossRef]
- Pasikhani, A.M.; Clark, J.A.; Gope, P. Adversarial RL-based IDS for evolving data environment in 6LoWPAN. IEEE Trans. Inf. Forensics Secur. 2022, 17, 3831–3846. [Google Scholar] [CrossRef]
- Almusaylim, Z.A.; Jhanjhi, N.; Alhumam, A. Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors 2020, 20, 5997. [Google Scholar] [CrossRef]
- Abdollahi, A.; Fathi, M. An intrusion detection system on ping of death attacks in IoT networks. Wirel. Pers. Commun. 2020, 112, 2057–2070. [Google Scholar] [CrossRef]
- Garcia Ribera, E.; Martinez Alvarez, B.; Samuel, C.; Ioulianou, P.P.; Vassilakis, V.G. An intrusion detection system for RPL-based IoT networks. Electronics 2022, 11, 4041. [Google Scholar] [CrossRef]
- Sobers, R. 166 Cybersecurity Statistics and Trends, Varonis. 2022. Available online: https://www.varonis.com/blog/cybersecurity-statistics (accessed on 20 January 2023).
- Kelly, C.; Pitropakis, N.; McKeown, S.; Lambrinoudakis, C. Testing and hardening IoT devices against the Mirai botnet. In Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, 15–19 June 2020; pp. 1–8. [Google Scholar]
- Kerbs, B. DDoS on Dyn Impacts Twitter, Spotify, Reddit, Kerbs on Security, Aug. 2016. Available online: https://krebsonsecurity.com/2016/10/ddos-on-dyn-impacts-twitter-spotify-reddit/ (accessed on 20 January 2023).
- Singh, K.; Singh, A. Memcached DDoS exploits: Operations, vulnerabilities, preventions and mitigations. In Proceedings of the 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS), Kathmandu, Nepal, 25–27 October 2018; pp. 171–179. [Google Scholar]
- Ioulianou, P.P.; Vassilakis, V.G.; Logothetis, M.D. Battery drain denial-of-service attacks and defenses in the Internet of things. J. Telecommun. Inf. Technol. 2019, 2, 37–45. [Google Scholar] [CrossRef]
- Lopez, J.; Babun, L.; Aksu, H.; Uluagac, A.S. A survey on function and system call hooking approaches. J. Hardw. Syst. Secur. 2017, 1, 114–136. [Google Scholar] [CrossRef]
- Smith, R.; Palin, D.; Ioulianou, P.P.; Vassilakis, V.G.; Shahandashti, S.F. Battery draining attacks against edge computing nodes in IoT networks. Cyber-Phys. Syst. 2020, 6, 96–116. [Google Scholar] [CrossRef]
- Lasi, H.; Fettke, P.; Kemper, H.G.; Feld, T.; Hoffmann, M. Industry 4.0. Bus. Inf. Syst. Eng. 2014, 6, 239–242. [Google Scholar] [CrossRef]
- Pliatsios, D.; Sarigiannidis, P.; Lagkas, T.; Sarigiannidis, A.G. A survey on SCADA systems: Secure protocols, incidents, threats and tactics. IEEE Commun. Surv. Tutor. 2020, 22, 1942–1976. [Google Scholar] [CrossRef]
- Ghosh, S.; Sampalli, S. A survey of security in SCADA networks: Current issues and future challenges. IEEE Access 2019, 7, 135812–135831. [Google Scholar] [CrossRef]
- Samtani, S.; Yu, S.; Zhu, H.; Patton, M.; Matherly, J.; Chen, H. Identifying SCADA systems and their vulnerabilities on the internet of things: A text-mining approach. IEEE Intell. Syst. 2018, 33, 63–73. [Google Scholar] [CrossRef]
- Froggatt, A.; Lewis, D.P. Attacks on Ukraine Nuclear Plant—What’s at Stake? Chatham House. August 2022. Available online: https://www.chathamhouse.org/2022/08/attacks-ukraine-nuclear-plant-whats-stake (accessed on 20 January 2023).
- Baram, G. How the Cyberwar between Iran and Israel Has Intensified, Washington Post, July 2022. Available online: https://www.washingtonpost.com/politics/2022/07/25/iran-israel-cyber-war/ (accessed on 20 January 2023).
- Orenstein, M. Russia’s Use of Cyberattacks: Lessons from the Second Ukraine War, Foreign Policy Research Institute. Available online: https://www.fpri.org/article/2022/06/russias-use-of-cyberattacks-lessons-from-the-second-ukraine-war/ (accessed on 20 January 2023).
- Ukraine Conflict: How Are Drones Being Used?’ BBC News, July 2022. Available online: https://www.bbc.co.uk/news/world-62225830 (accessed on 20 January 2023).
- Tsao, K.Y.; Girdler, T.; Vassilakis, V.G. A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Netw. 2022, 133, 102894. [Google Scholar] [CrossRef]
- Shi, L.; Marcano, N.H.; Jacobsen, R.H. A review on communication protocols for autonomous unmanned aerial vehicles for inspection application. Microprocess. Microsyst. 2021, 86, 104340. [Google Scholar] [CrossRef]
- Ali, I.; Ahmed, I.A.; Almogren, A.; Raza, M.A.; Shah, S.A.; Khan, A.; Gani, A. Systematic literature review on IoT-based botnet attack. IEEE Access 2020, 8, 212220–212232. [Google Scholar] [CrossRef]
- McNulty, L.; Vassilakis, V.G. IoT botnets: Characteristics, exploits, attack capabilities, and targets. In Proceedings of the 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Porto, Portugal, 20–22 July 2022; pp. 350–355. [Google Scholar]
- Ioulianou, P.P.; Vassilakis, V.G. Denial-of-service attacks and countermeasures in the RPL-based Internet of Things. In Proceedings of the International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT), Luxembourg, 14–18 September 2019; pp. 374–390. [Google Scholar]
- Goodin, D. Microsoft Fends off Record-Breaking 3.47tbps Ddos Attack, Ars Technica, January 2022. Available online: https://arstechnica.com/information-technology/2022/01/microsoft-fends-off-record-breaking-3-47-tbps-ddos-attack/ (accessed on 20 January 2023).
- Lauridsen, M.; Krigslund, R.; Rohr, M.; Madueno, G. An empirical NB-IoT power consumption model for battery lifetime estimation. In Proceedings of the IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018; pp. 1–5. [Google Scholar]
- Gray, C.; Ayre, R.; Hinton, K.; Tucker, R.S. Power consumption of IoT access network technologies. In Proceedings of the International Conference on Communication (ICC), London, UK, 8–12 June 2015; pp. 2818–2823. [Google Scholar]
- Jung, W.; Zhao, H.; Sun, M.; Zhou, G. IoT botnet detection via power consumption modeling. Smart Health 2020, 15, 100103. [Google Scholar] [CrossRef]
- Yu, F.; Zhu, Z.; Fan, Z. Study on the feasibility of LoRaWAN for smart city applications. In Proceedings of the 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Rome, Italy, 9–11 October 2017; pp. 334–340. [Google Scholar]
- Mdhaffar, A.; Chaari, T.; Larbi, K.; Jmaiel, M.; Freisleben, B. IoT-based health monitoring via LoRaWAN. In Proceedings of the IEEE EUROCON 2017 17th International Conference on Smart Technologies, Ohrid, North Macedonia, 6–8 July 2017; pp. 519–524. [Google Scholar]
- Lu, X.; Kim, I.H.; Xhafa, A.; Zhou, J.; Tsai, K. Reaching 10-years of battery life for industrial IoT wireless sensor networks. In Proceedings of the Symposium on VLSI Circuits, Kyoto, Japan, 5–8 June 2017; pp. C66–C67. [Google Scholar]
- Pinto, S.; Cabral, J.; Gomes, T. We-care: An IoT-based health care system for elderly people. In Proceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT), Toronto, ON, Canada, 22–25 March 2017; pp. 1378–1383. [Google Scholar]
- Intel, Intel Launches Low-Power, High-Performance Silvermont Microarchitecture, Intel Newsroom, May 2013. Available online: https://newsroom.intel.com/news-releases/intel-launches-low-power-high-performance-silvermont-microarchitecture/. (accessed on 20 January 2023).
- List, J. Intel Discontinues Joule, Galileo, and Edison Product Lines, Hackaday, June 2017. Available online: https://hackaday.com/2017/06/19/intel-discontinues-joule-galileo-and-edison-product-lines/ (accessed on 20 January 2023).
- Raspberry Pi. Available online: https://www.raspberrypi.com/ (accessed on 20 January 2023).
- Pimoroni, Pico Wireless Pack. Available online: https://shop.pimoroni.com/products/pico-wireless-pack (accessed on 20 January 2023).
- Mistry, S. Pico-Rmii-Ethernet, GitHub, May 2022. Available online: https://github.com/sandeepmistry/pico-rmii-ethernet (accessed on 20 January 2023).
- Österlind, F. A Sensor Network Simulator for the Contiki os, Digitala Vetenskapliga Arkivet. Available online: http://www.diva-portal.org/smash/record.jsf?pid=diva2%3A1041560&dswid=-2196 (accessed on 20 January 2023).
- IoT Lab. Available online: https://www.iot-lab.info/ (accessed on 20 January 2023).
- Thc-IPv6, Kali Linux. Available online: https://www.kali.org/tools/thc-ipv6/ (accessed on 20 January 2023).
- Samuel, C.; Alvarez, B.M.; Ribera, E.G.; Ioulianou, P.P.; Vassilakis, V.G. Performance evaluation of a wormhole detection method using round-trip times and hop counts in RPL-based 6LoWPAN networks. In Proceedings of the 12th IEEE/IET International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Porto, Portugal, 20–22 July 2020; pp. 1–6. [Google Scholar]
- Ribera, E.G.; Alvarez, B.M.; Samuel, C.; Ioulianou, P.P.; Vassilakis, V.G. Heartbeat-based detection of blackhole and greyhole attacks in RPL networks. In Proceedings of the 12th IEEE/IET International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Porto, Portugal, 20–22 July 2020; pp. 1–6. [Google Scholar]
- Al-Asadi, H.A.; Hasan, R.; Nassr, M.; Anbar, M. Power consumption in wireless sensor network: A machine learning approach. Comput. Perform. Commun. Syst. 2022, 6, 24–37. [Google Scholar]
- Pajila, P.B.; Julie, E.G.; Robinson, Y.H. FBDR-Fuzzy based DDoS attack detection and recovery mechanism for wireless sensor networks. Wirel. Pers. Commun. 2021, 122, 3053–3083. [Google Scholar] [CrossRef]
- Sayakkara, A.; Le-Khac, N.A.; Scanlon, M. A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digit. Investig. 2019, 29, 43–54. [Google Scholar] [CrossRef] [Green Version]
- Abrishamchi, M.A.; Zainal, A.; Ghaleb, F.A.; Qasem, S.N.; Albarrak, A.M. Smart home privacy protection methods against a passive wireless Snooping side-channel attack. Sensors 2022, 22, 8564. [Google Scholar] [CrossRef] [PubMed]
- Xie, J.Y.; Tseng, Y.M.; Huang, S.S. Leakage-resilient anonymous multireceiver certificateless encryption resistant to side-channel attacks. IEEE Syst. J. 2022, 1–12. [Google Scholar] [CrossRef]
- Lyu, Y.; Mo, Y.; Yue, S.; Liu, W. Improved beetle antennae algorithm based on localization for jamming attack in wireless sensor networks. IEEE Access 2022, 10, 13071–13088. [Google Scholar] [CrossRef]
- Arpaia, P.; Bonavolonta, F.; Cioffi, A.; Moccaldi, N. Reproducibility enhancement by optimized power analysis attacks in vulnerability assessment of IoT transducers. IEEE Trans. Instrum. Meas. 2021, 70, 1–8. [Google Scholar] [CrossRef]
- Nguyen, V.L.; Lin, P.C.; Hwang, R.H. Energy depletion attacks in low power wireless networks. IEEE Access 2019, 7, 51915–51932. [Google Scholar] [CrossRef]
Architecture Support (S, M, L) | Large Community Support (Y, N) | Low Power Protocol Support (S, M, L) | Kernel | Complexity (S, M, L) | |
---|---|---|---|---|---|
Contiki-ng | S | Y | L | Contiki OS | M |
RIOT OS | M | N | L | Unix | M |
Free RTOS | L | N | L | RTOS | L |
Ubuntu Core | M | N | L | Linux | S |
Linux Arch | M | Y | S | Linux | S |
Raspbian | S | Y | S | Linux | S |
Tiny Core | L | Y | L | Linux | S |
Buildroot | L | Y | L | Embedded | S |
Linux | |||||
Android | S | N | S | Android | N/A |
Things | |||||
Yocto OS | L | N | L | Linux | L |
Tiny OS | M | N | L | Component | L |
based | |||||
Windows 10 | L | N | L | Windows | S/M |
IoT Core | |||||
Azure | S | N | M | Linux | L |
Sphere | |||||
Kali | L | Y | S | Linux | S |
Hardware | Arch. | Large Community Support | Wireless Support | Price | Avail. | Extras | Support for OSes Selected |
---|---|---|---|---|---|---|---|
Intel | x86 | Y | N | $50 | N | Y | N |
Edison | |||||||
Raspberry | ARM | Y | N | £5 | Y | N | N |
Pi Pico | (Armv6-M) | ||||||
Raspberry | ARM | Y | N | £10 | Y | SD card | Y |
Pi Zero | (Armv6) | ||||||
Raspberry | ARM | Y | Y | £12 | Y | SD card | Y |
Pi Zero W | (Armv6) | ||||||
Raspberry | ARM | Y | Y | £12 | N | SD card | Y |
Pi Zero 2 W | (Armv8-A) | ||||||
Zolertia | RISC | Y | Y | $170 | N | SW | N |
Z1 | |||||||
Zolertia | ARM | Y | Y | 50 | Y | SW | Y |
Firefly | (Armv7-M) |
Yocto OS | Tiny Core Linux | Raspberry Pi OS | |
---|---|---|---|
Zero | Compatible. Medium ease of installation. However, lack of comparable results due to lack of wireless antenna. Some issues possible due to old processor. | Compatible. Medium ease of installation. However, lack of comparable results due to lack of wireless antenna. Some issues possible due to old processor. | Compatible. High ease of installation. However, lack of comparable results due to lack of wireless antenna. Some issues possible due to old processor. |
Zero W | Compatible. Medium ease of installation. High likeliness of usable results. Old processor. | Compatible. Medium ease of installation. High likeliness of usable results. Old processor. | Compatible. High ease of installation. High likeliness of usable results. Old processor. |
Zero 2 W | Compatible. Medium ease of installation. High likeliness of usable results. Modern processor. | Compatible. Medium ease of installation. High likeliness of usable results. Modern processor. | Compatible. High ease of installation. High likeliness of usable results. Modern processor. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Przybocki, P.; Vassilakis, V.G. An Analysis into Physical and Virtual Power Draw Characteristics of Embedded Wireless Sensor Network Devices under DoS and RPL-Based Attacks. Sensors 2023, 23, 2605. https://doi.org/10.3390/s23052605
Przybocki P, Vassilakis VG. An Analysis into Physical and Virtual Power Draw Characteristics of Embedded Wireless Sensor Network Devices under DoS and RPL-Based Attacks. Sensors. 2023; 23(5):2605. https://doi.org/10.3390/s23052605
Chicago/Turabian StylePrzybocki, Patryk, and Vassilios G. Vassilakis. 2023. "An Analysis into Physical and Virtual Power Draw Characteristics of Embedded Wireless Sensor Network Devices under DoS and RPL-Based Attacks" Sensors 23, no. 5: 2605. https://doi.org/10.3390/s23052605
APA StylePrzybocki, P., & Vassilakis, V. G. (2023). An Analysis into Physical and Virtual Power Draw Characteristics of Embedded Wireless Sensor Network Devices under DoS and RPL-Based Attacks. Sensors, 23(5), 2605. https://doi.org/10.3390/s23052605