Project Proposal
Project Proposal
Project Proposal
A PROJECT PROPOSAL
PRESENTED
BY
ELIZABETH ENEWA PATRICK
PSP/SICT/CSC/ND/21/0404
OCTOBER, 2024
CHAPTER ONE
1.0 INTRODUCTION
Detection Techniques
Prevention Techniques
Hybrid Approaches
PROBLEM STATEMENT
1. RESEARCH MOTIVATION
The need for a system that will detect and prevent Denial sleep
attacks in Wireless Sensor Networks is a pointer and a reason that
encouraged the need for this research.
5. RESEARCH METHODOLOGY
The methods to be used in conducting the study will be under the following sub-
sections:
i. Research design
ii. Area of Study
iii. Sample
iv. Sampling technique
v. Instrument for Data Collection
vi. Procedure of data collection
vii. Validation and reliability of instrument
viii. Administration of Instruments
ix. Method of Data Presentation and Analyses.
CHAPTER TWO
2.0 LITERATURE REVIEW
The Bluetooth Low Energy protocol uses master/slave roles to control how
the BLE radio connection is managed. In this setup any device can be
either the master or the slave depending on initiator contact and vendor
implementation. The master device can connect up to seven slave devices
to form what is referred to as BLE piconet. Slaved devices can connect to
one master device at a time but they are allowed to switch between master
devices to form ad-hoc interconnected piconets which
are referred to as BLE scatter nets. A master device can poll any of the
slave sensor devices for sensor data but the slave can only communicate
to the master when initiated by the master device. The protocol is built for
ultra-low power consumption and an extended range when compared to
traditional Bluetooth by utilizing 40 of the 80 channels at the 2.4GHz ISM
band using a GFSK modulation with 0.5 index. The 2 MHz guard intervals
and the allocation of 3 advertising channels when compared to traditional
Bluetooth offer faster connection times and lower power consumption. BLE
devices access data through the use of profiles, services, and
characteristics that are derived from the General Attribute Profile (GATT) in
an object oriented and server based structure. Profiles are definitions of
possible applications and they can specify general behavior. The GATT
profile utilizes a client/server which specifies storage and data flow. In
order to share application specific data BLE devices must conform to the
same profiles that can be generic and proprietary. A service is a collection
of data and behavior that represents a specific function or aspect. Services
are defined and accessed by either a 16 or 128 bit unique UUID. The
collection of data in a service is represented by characteristics.
Characteristics contain a single labelled, defined, and discrete value that
represents a specific attribute of the sensor, e.g. temperature, step count,
or battery life. Although the characteristic is a single value it can be made
up of several sensor data points. For example, data from the
accelerometer x, y, and z dimensions can form a single velocity value.
Characteristics have a behavior component that states how the information
can be accessed, i.e. read, read write no-response, read write-response,
and notify. The standard defines several profiles, but also allows vendors
to define proprietary functions. Each characteristic is defined and accessed
by either a 16 or 128 bit unique
i. In this model, the total sensor life, is the sum of the charge drawn by
each of the N operating modes of the sensor. This draw is calculated by
multiplying the power draw of each state, Pn by the amount of time that
state is active, Tn. In the simplest case, and that analyzed in, is the
case where there are only two modes: processing and sleeping. In this
case, the characterization of Tlife can be reduced to a single dependent
variable based on the amount of time the sensor spends sleeping (Ts)
and active (Ta).
ii. This reduces our model for the total sensor life to Milcom 2016 Track 3
- Cyber Security and Trusted Computing
iii. While this model would be considered low fidelity for most WSNs, it fits
perfectly for a protocol such as BLE for two primary reasons. First, the
design of the BLE protocol closely matches this model in that there are
really only two modes of operation: actively sensing and reporting or
asleep. Second, due to the relative efficiency of modern ASICs,
transmit and receive functionalities in BLE consume similar amounts of
current. When nodes are receiving commands, processing data, or
actively transmitting they consume approximately the same amount of
current making the concept of a single Pactive very realistic. If we
assume that a sensor is reading in sufficient intervals then the ratio of
sleep and active time will remain constant, we can rearrange equation 3
and take the derivative to find the consumption over time.
iv. With this discharge rate, we can find the estimated battery capacity at
time t as Cbat(t) = Cbatt=0 − RsPs +(1 − Rs)Pa (6)
v. Finally, because BLE requests allow for simultaneous read and write
requests on different hopsets, equation 6 can be modified to allow for
Nc simultaneous commands. In this case, the amount of power drawn
while actively decoding commands is increased linearly with Nc, as
shown in Cbat(t) = Cbatt=0 − RsPs +(1 v. − Rs)(PaNc) This final
equation will provide us with an estimate of the battery at any time t
within the discharge cycle of the node. Section VII demonstrates the
efficacy of this predictor with respect to measured data during the
attack.
Experimental Attack
Attack Implementation
The Fitbit Charge HR was chosen as the target BLE sensor node for
this test because of its new release and 120-hour extended operation.
This device was a good candidate because it collects sensor data and
periodically communicates the eHealth metrics to the master device via
BLE. The system was modeled to collect data for an average person
and periodically pass that data when polled at deterministic intervals
from the master device so as to have the battery last 120 hours before
recharge. The first step was to characterize the Fitbit Charge HR
system in a normal working environment. This was completed using an
Ellisys Bluetooth Explorer which passively sniffs all traffic for Bluetooth
and BLE.
REFERENCES
A. Manjeshwar and D. P. Agrawal, “Teen: a routing protocol for
enhanced efficiency in wireless sensor networks,” in null. IEEE, 2001,
p. 30189a.
C. Chen, L. Hui, Q. Pei, L. Ning, and P. Qingquan, “An effective scheme
for defending denial-of-sleep attack in wireless sensor networks,” in
Information Assurance and Security, 2009. IAS’09. Fifth International
Conference on, vol. 2. IEEE, 2009, pp. 446–449.
D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff,
“Effects of denial-of-sleep attacks on wireless sensor network mac
protocols,” Vehicular Technology, IEEE Transactions on, vol. 58, no.
1, pp. 367–380, 2009.
D. R. Raymond and S. F. Midkiff, “Clustered adaptive rate limiting:
Defeating denial-of-sleep attacks in wireless sensor networks,” in
Military Communications Conference, 2007. MILCOM 2007. IEEE.
IEEE, 2007, pp. 1–7.
I. T. Union, “Future technology trends of terrestrial imt systems,” ITU
M.2320-0, 2014.
K. Nair, J. Kulkarni, M. Warde, Z. Dave, V. Rawalgaonkar, G. Gore, and
J. Joshi, “Optimizing power consumption in iot based wireless sensor
networks using bluetooth low energy,” in Green Computing and
Internet of Things (ICGCIoT), 2015 International Conference on.
IEEE, 2015, pp. 589–593
M. Brownfield, Y. Gupta, and N. Davis IV, “Wireless sensor network
denial of sleep attack,” in Information Assurance Workshop, 2005.
IAW’05. Proceedings from the Sixth Annual IEEE SMC. IEEE, 2005,
pp. 356–364.
M. Patel and J. Wang, “Applications, challenges, and prospective in
emerging body area networking technologies,” IEEE Wireless
Communications Magazine, vol. 17, no. 1, pp. 80–88, 2010.
P. Bellavista, G. Cardone, A. Corradi, and L. Foschini, “Convergence
of manet and wsn in iot urban scenarios,” Sensors Journal, IEEE, vol.
13, no. 10, pp. 3558–3567, 2013.
Y. W. Law, P. Hartel, J. D. Hartog, and P. Havinga, “Link-layer jamming
attacks on s-mac,” in Wireless Sensor Networks, 2005. Proceeedings
of the Second European Workshop on. IEEE, 2005, pp. 217–225.
T. Bhattasali and R. Chaki, “Amc model for denial of sleep attack
detection,” arXiv preprint arXiv:1203.1777, 2012.
W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient mac protocol
for wireless sensor networks,” in INFOCOM 2002. Twenty-First
Annual Joint Conference of the IEEE Computer and Communications
Societies. Proceedings. IEEE, vol. 3. IEEE, 2002, pp. 1567–1576.