Table of Contents

Mirov 2014 - police scenario experiment

Plan is to get as much data as possible about behavior of real nodes when deployed as described by Police scenario with ProtectLayer application with full implementation enabled. Main goal is to field-test late version of prototype application.

Presentation of experiment details:

Analysis

TBD

Design

Testing process

  1. Place nodes, BS, sniffers. All nodes are waiting for magic packet
  2. Connect sniffers to BS
  3. # Send magic packet from BS == Privacy level == 0
  4. capture 10 minutes of traffic
  5. Move intruder and MSN throw network (direct straight, around)
  6. # Send privacy level change from BS == Privacy level == 1 (encrypted traffic)
  7. capture 10 minutes of traffic

Components used

Node types

Time schedule

What to take

Programming nodes

  1. Moved to default channel (comment -DCC2420_DEF_RFPOWER=11, -DCC2420_DEF_CHANNEL=20 in relevant Makefiles (node, bs, sniffer))
  2. RestoreFromFlash EEPROM disabled (ProtectLayerGlobals.h #define SKIP_EEPROM_RESTORE)

Sniffer:

cd /opt/tinyos-2.1.1/apps/BaseStation
make telosb install,14 bsl,/dev/ttyUSB2
run listener: java net.tinyos.tools.Listen -comm serial@/dev/ttyUSB2:telosb

BaseStation:

cd /tinyos/PL_BaseStation/src
make telosb install,14 bsl,/dev/ttyUSB0
run listener:java net.tinyos.tools.PrintfClient -comm serial@/dev/ttyUSB0:telosb

Ordinary node:

cd /tinyos/PL_PoliceApp/src
make telosb install,21 bsl,/dev/ttyUSB1
run listener:java net.tinyos.tools.PrintfClient -comm serial@/dev/ttyUSB1:telosb