Faculty Advisor Name
Heydari, M. Hossain
Description
To demonstrate our work, we have implemented a secure temperature monitoring system that makes use of the IEEE 802.15.4 standard, AES-128 hardware encryption and TelosB sensor nodes. In our design, we consider one of the nodes to be a coordinator node, which plays the role of a central node that establishes network association requests, listens for incoming packets, decrypts the incoming packets and forwards any received packets to the monitoring device. Three other nodes act as end-devices, which play the role of collecting temperature measurements, encrypting the collected data and sending the encrypted packets to the coordinator node. A last one acts as packet sniffer, which plays the role of listening to packets sent over the network and forwarding the capture packets to Wireshark. We study the security used in WSNs and perform hacking scenarios on our environmental monitoring system.
Investigating Security Attacks on Wireless Sensor Networks (WSNs) via an IoT Environmental Monitoring System
To demonstrate our work, we have implemented a secure temperature monitoring system that makes use of the IEEE 802.15.4 standard, AES-128 hardware encryption and TelosB sensor nodes. In our design, we consider one of the nodes to be a coordinator node, which plays the role of a central node that establishes network association requests, listens for incoming packets, decrypts the incoming packets and forwards any received packets to the monitoring device. Three other nodes act as end-devices, which play the role of collecting temperature measurements, encrypting the collected data and sending the encrypted packets to the coordinator node. A last one acts as packet sniffer, which plays the role of listening to packets sent over the network and forwarding the capture packets to Wireshark. We study the security used in WSNs and perform hacking scenarios on our environmental monitoring system.