Attack on the Chaos Sensor Network Protocol
As the demand for wireless sensor networks increases the need for new protocols with specific ways of distributing data emerges. Chaos is one of those protocols. Chaos has no native security countermeasures implemented, therefore it is important to test how vulnerable it is against attacks. In this...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Uppsala universitet, Institutionen för informationsteknologi
2015
|
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-260480 |
id |
ndltd-UPSALLA1-oai-DiVA.org-uu-260480 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-uu-2604802015-08-20T05:02:58ZAttack on the Chaos Sensor Network ProtocolengGerbert, OscarUppsala universitet, Institutionen för informationsteknologi2015As the demand for wireless sensor networks increases the need for new protocols with specific ways of distributing data emerges. Chaos is one of those protocols. Chaos has no native security countermeasures implemented, therefore it is important to test how vulnerable it is against attacks. In this thesis I present four novel attacks to test the robustness of Chaos. Experiments show that a Drizzle-attack was the most effective attack, strategic placement of the nodes was the key to a more efficient attack. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-260480IT ; 15028application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
description |
As the demand for wireless sensor networks increases the need for new protocols with specific ways of distributing data emerges. Chaos is one of those protocols. Chaos has no native security countermeasures implemented, therefore it is important to test how vulnerable it is against attacks. In this thesis I present four novel attacks to test the robustness of Chaos. Experiments show that a Drizzle-attack was the most effective attack, strategic placement of the nodes was the key to a more efficient attack. |
author |
Gerbert, Oscar |
spellingShingle |
Gerbert, Oscar Attack on the Chaos Sensor Network Protocol |
author_facet |
Gerbert, Oscar |
author_sort |
Gerbert, Oscar |
title |
Attack on the Chaos Sensor Network Protocol |
title_short |
Attack on the Chaos Sensor Network Protocol |
title_full |
Attack on the Chaos Sensor Network Protocol |
title_fullStr |
Attack on the Chaos Sensor Network Protocol |
title_full_unstemmed |
Attack on the Chaos Sensor Network Protocol |
title_sort |
attack on the chaos sensor network protocol |
publisher |
Uppsala universitet, Institutionen för informationsteknologi |
publishDate |
2015 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-260480 |
work_keys_str_mv |
AT gerbertoscar attackonthechaossensornetworkprotocol |
_version_ |
1716817280165216256 |