Hacker Detection: Jamming a WSN

Download Report

Transcript Hacker Detection: Jamming a WSN

Nabila Rahman
[email protected]
Matthew Wright
[email protected]
John Davis
[email protected]
Eric Manuel
[email protected]
Teacher Introduction:
Eric Manuel teaches at Duncanville High School in Duncanville, Texas. Computer Maintenance, Telecommunications and Cabling, Electronics, and Advanced Electronics. In his 5th year of teaching, his
classes consist mostly of sophomores through seniors. This is the second year of his participation in the RET program.
Project Background
•Wireless Sensor Network:
Can be used for detecting intruders in a secured area
•Jamming Characteristics:
Deliberate transmission of signals to disrupt communications
•Known issues:
Early detection of jamming the desired regions
Experimentation – WSN performed indoors under a 49 count network. Summer
weather conditions made outdoor experimentation difficult due to the standing water
and humidity.
Research
Utilizing the motes, the team was able to effectively conduct 2 complete indoor experiments. The resulting data was generated based on simulation programs written by Nabila using TinyOS 2.0 and
run by John and myself. From these trials, the following data could be viewed.
•How many neighbors were viewed to be active during jamming period.
Precision of data packets reaching their destination
•How many nodes jammed per session.
Percentage of packets being recalled.
Simulation Results
Precision
Precision vs. Recall
Recall
Jammed Nodes
600
600
Precision
600
800
800
Recall
800
1000
1000
1000
Modifications for lesson plan
Conclusion:
The data was able to verify that while jamming the nodes, the neighbors
were grouped in an amorphous shape. The jamming was effective for at
least 2 neighbors away from the jammer.
From this result, the jammer could cover an effective area for a short
period of time.
The sensors were sensitive to high levels of humidity and made outdoor
experimentation difficult during wet weather.
From the research this summer, I have been able to modify my lesson plan
over physical security to include wireless sensors and their ability to detect
activity. The physical security was a basic overview of what an IT group
needs to safeguard the hardware for their users. The research allows me
to include wireless sensors to demonstrate the susceptibility of a secure
wireless network.
Department of Computer Science and Engineering
The University of Texas at Arlington