Implementing a broadcast storm attack on a mission-critical wireless sensor network

Irina Krivtsova, Ilya Lebedev, Mikhail Sukhoparov, Nurzhan Bazhayev, Igor Zikratov, Aleksandr Ometov, Sergey Andreev, Pavel Masek, Radek Fujdiak, Jiri Hosek

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    14 Citations (Scopus)
    16 Downloads (Pure)


    In this work, we emphasize the practical importance of mission-critical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines, we review and implement one such attack, named a broadcast storm, where an attacker is attempting to flood the network by sending numerous broadcast packets. Accordingly, we assemble a live prototype of said scenario with real-world WSN equipment, as well as measure the key operational parameters of the WSN under attack, including packet transmission delays and the corresponding loss ratios.We further develop a simple supportive mathematical model based on widely-adopted methods of queuing theory. It allows for accurate performance assessment as well as for predicting the expected system performance, which has been verified with statistical methods.

    Original languageEnglish
    Title of host publicationWired/Wireless Internet Communications
    Subtitle of host publication14th IFIP WG 6.2 International Conference, WWIC 2016, Thessaloniki, Greece, May 25-27, 2016, Proceedings
    PublisherSpringer Verlag
    Number of pages12
    ISBN (Print)9783319339351
    Publication statusPublished - 2016
    Publication typeA4 Article in conference proceedings
    EventInternational Conference on Wired/Wireless Internet Communication -
    Duration: 1 Jan 1900 → …

    Publication series

    NameLecture Notes in Computer Science
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349


    ConferenceInternational Conference on Wired/Wireless Internet Communication
    Period1/01/00 → …


    • Ad hoc networks
    • Device availability
    • Information security
    • Multi-agent systems
    • Prototyping
    • Vulnerability

    Publication forum classification

    • Publication forum level 1

    ASJC Scopus subject areas

    • Computer Science(all)
    • Theoretical Computer Science


    Dive into the research topics of 'Implementing a broadcast storm attack on a mission-critical wireless sensor network'. Together they form a unique fingerprint.

    Cite this