120 likes | 140 Views
A Web-based Console for Controlling a Wireless Sensor network. Team A: Thang Nguyen – Duc Duong Course CSCI 5234: Web Security Instructor: Dr. T. Andrew Yang. Table of Contents. Introduction to Wireless Sensor Network Architecture of WeConWSN Application Application Overview Login
E N D
A Web-based Console for Controlling a Wireless Sensor network Team A: Thang Nguyen – Duc Duong Course CSCI 5234: Web Security Instructor: Dr. T. Andrew Yang
Table of Contents • Introduction to Wireless Sensor Network • Architecture of WeConWSN Application • Application Overview • Login • Registration • Search • Configure: Update and Delete • Potential vulnerability of the application • Questions and Answers
Introduction to Wireless Sensor Network • A wireless sensor network (WSN) is a computer network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. • Each node in a sensor network is typically equipped with a radio transceiver or other wireless communications device, a small microcontroller, and an energy source, usually a battery. • The properties of a sensor node usually consist of Node_ID, Name, Type, Status, Location, Range, and Route.
Architecture of the WeConWSN Application • The overall architecture of the WeConWSN Application is three tiers, which are: • Client: Client is a web browser to access web application to configure the network. • Web Application: Web Application resides on web server. It processes the request of clients and updates the result of the request on database server if needed. • Database Server: Store information about the network.
Potential vulnerability of the application • To login, the web browser forward username and password in clear text to the Web server. The passwords are exposed to eavesdropping and corresponding sniffing attacks. • The username and password transferred between Web server and Database server are also exposed to eavesdropping and corresponding sniffing attacks. • Besides, there is some other vulnerability such as Trojan, URL attack, DDoS, and attacks from many kind of viruses.
Questions and Answers Thank you !