Wireless Sensor Networks: Virtual Platform for Performance Analysis and Attack Simulation

  • Álvaro DíazEmail author
  • Javier González
  • Pablo Sánchez


This chapter presents a virtual platform that is able to provide performance estimation of hardware/software systems, including communication networks (networked embedded systems). The framework is mainly focused on performance analysis of Wireless Sensor Networks (WSN) before deployment. The platform can also simulate the most common attacks that a WSN can suffer. This combination of unique features makes the virtual platform a key tool for simulating security in low power WSN at the first stages of the design process.


Virtual Platform RTOS Model Packet Loss Probability Fake Packets Node Replication Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Abdullah, M., Hua, G.W., Alsharabi, N.: Wireless sensor networks misdirection attacker challenges and solutions. In: IEEE International Conference on Information and Automation, 2008 (ICIA 2008), Hunan, pp. 369–373 (2008)Google Scholar
  2. 2.
    Agilent Technologies. (2014) Google Scholar
  3. 3.
  4. 4.
    Becher, A., Benenson, Z., Dornseif, M.: Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Proceedings of the Third international conference on Security in Pervasive Computing (SPC’06), pp. 104–118, Springer, York, UK (2006)Google Scholar
  5. 5.
    FreeRTOS. (2014)
  6. 6.
    Levis, P., Lee, N., Welsh, M., Culler, D.: Tossim: accurate and scalable simulation of entire tinyos applications. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys ’03), Los Angeles, pp. 126–137. ACM, New York (2003). doi:10.1145/958491.958506.
  7. 7.
    Mekni, M., Moulin, B.: A survey on sensor webs simulation tools. In: Second International Conference on Sensor Technologies and Applications, 2008 (SENSORCOMM ’08), Cap Esterel, pp. 574–579 (2008). doi:10.1109/SENSORCOMM.2008.13 Google Scholar
  8. 8.
    Mohammadi, S., Jadidoleslamy, H.: A comparison of link layer attacks on wireless sensor networks. Int. J. Appl. Graph Theory Wirel. Ad Hoc Netw. Sens. Netw. 3(1), 69–84 (2011)Google Scholar
  9. 9.
    Mohanty, P., Panigrahi, S., Sarma, N., Satapathy, S.S.: Security issues in wireless sensor network data gathering protocols: a survey. J. Theor. Appl. Inf. Technol. 13(1), 14–27 (2010)Google Scholar
  10. 10.
    NS-2 The Network Simulator. (2014)
  11. 11.
    OMNeT++. (2014)
  12. 12.
    Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.V.: Denial of service attacks in wireless networks: the case of Jammers. IEEE Commun. Surv. Tutor. 13, 245–257 (2011). doi:10.1109/SURV.2011.041110.00022 CrossRefGoogle Scholar
  13. 13.
    Posadas, H., Castillo, J., Quijano, D., Fernandez, V., Villar, E., Martinez, M. SystemC platform modeling for behavioral simulation and performance estimation of embedded systems. In: Behavioral Modeling for Embedded Systems and Technologies: Applications for Design and Implementation. IGI Global, 2010, pp. 219–243 (2014). doi:10.4018/978-1-60566-750-8.ch009 Google Scholar
  14. 14.
    Posadas, H., Díaz, Á., Villar, E.: Sw Annotation Techniques and RTOS Modelling for Native Simulation of Heterogeneous Embedded Systems. INTECH Open Access Publisher (2012)Google Scholar
  15. 15.
    Reindl, P., Nygard, K., Du, X.: Defending malicious collision attacks in wireless sensor networks. In: 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, pp. 771–776. IEEE (2010)Google Scholar
  16. 16.
    Tinyos. (2014)
  17. 17.
    Torres, R., Valle, L., Domingo, M., Diez, M.: Cindoor: an engineering tool for planning and design of wireless systems in enclosed spaces. IEEE Antennas Propag. Mag. 41(4), 11–22 (1999)CrossRefGoogle Scholar
  18. 18.
    Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2–23 (2006). doi:10.1109/COMST.2006.315852 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Álvaro Díaz
    • 1
    Email author
  • Javier González
    • 1
  • Pablo Sánchez
    • 1
  1. 1.University of CantabriaETSIITSantanderSpain

Personalised recommendations