A study of self-propagating mal-packets in sensor networks: Attacks and defenses

被引:12
作者
Gu, Qijun [1 ]
Ferguson, Christopher [1 ]
Noorani, Rizwan [1 ]
机构
[1] Texas State Univ San Marcos, Dept Comp Sci, San Marcos, TX 78666 USA
关键词
Mal-packet; Buffer overflow; Memory fault; Code injection; Control flow; Sensor security;
D O I
10.1016/j.cose.2010.10.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since sensor applications are implemented in embedded computer systems, cyber attacks that compromise regular computer systems via exploiting memory-related vulnerabilities present similar threats to sensor networks. However, the paper shows that memory fault attacks in sensors are not the same as in regular computers due to sensor's hardware and software architecture. In contrast to worm attacks, mal-code carried by exploiting packets cannot be executed in sensors built upon Harvard architecture. Therefore, the paper proposes a range of attack approaches to illustrate that a mal-packet, which only carries specially crafted data, can exploit memory-related vulnerabilities and utilize existing application code in a sensor to propagate itself without disrupting the sensor's functionality. The paper shows that such a mal-packet can have as few as 17 bytes. A prototype of a 27-byte mal-packet has been implemented and tested in Mica2 sensors. Simulation shows that the propagation pattern of such a mal-packet in a sensor network is very different from worm propagation. Mal-packets can either quickly take over the whole network or hardly propagate under different traffic situations. The paper also develops two defense schemes (S2Guard and S2Shuffle) based on existing defense techniques to protect sensor applications. The analysis shows that they only incur a little overhead and can stop the propagation of mal-packets. (c) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:13 / 27
页数:15
相关论文
共 40 条
  • [1] AKRITIDIS P, 2009, P USENIX SEC S
  • [2] Aleph One, 1996, SMASH STACK FUN PROF
  • [3] BHATKAR S, 2005, P 14 USENIX SEC S, P17
  • [4] Bhatkar Sandeep, 2003, P USENIX SEC S
  • [5] Buchanan E, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P27
  • [6] Cadar C., 2006, CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, New York, NY, USA, P322, DOI 10.1145/1180405.1180445
  • [7] CHEN S, 2005, P USENIX SEC S
  • [8] CHRISTODORESCU M, 2003, P USENIX SEC S
  • [9] COSTA M, 2005, P ACM SOSP
  • [10] Cowan Crispin, 2003, P USENIX SEC S