Skip to main content
Erschienen in: Wireless Networks 5/2014

01.07.2014

A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks

verfasst von: Roberta Daidone, Gianluca Dini, Marco Tiloca

Erschienen in: Wireless Networks | Ausgabe 5/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The IEEE 802.15.4 standard allows devices to access the medium not only in contention mode but also in a contention-free way, in order to support quality of service (QoS). In contention-free mode, devices access the medium according to the guaranteed time slot (GTS) mechanism, which is vulnerable to the selective jamming attack. This is a particularly insidious form of denial of service that allows an attacker to thwart QoS while limiting her own exposure at the minimum. In this paper, we present selective jamming resistant GTS , a solution against the GTS-based selective jamming. We also show that our solution is standard compliant and affordable for resource-scarce devices like Tmote Sky motes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
6.
Zurück zum Zitat Koubaa, A., Alves, M., & Tovar, E. (2006). GTS allocation analysis in IEEE 802.15.4 for real-time wireless sensor networks. In: 20th International Parallel and Distributed Processing Symposium. Koubaa, A., Alves, M., & Tovar, E. (2006). GTS allocation analysis in IEEE 802.15.4 for real-time wireless sensor networks. In: 20th International Parallel and Distributed Processing Symposium.
7.
Zurück zum Zitat Proano, A., & Lazos, L. (2010). Selective jamming attacks in wireless networks. In: 2010 IEEE International Conference on Communications, pp. 1–6. Proano, A., & Lazos, L. (2010). Selective jamming attacks in wireless networks. In: 2010 IEEE International Conference on Communications, pp. 1–6.
8.
Zurück zum Zitat Woo, A., Tong, T., & Culler, D. (2003). Taming the underlying challenges of reliable multihop routing in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys ’03, (pp. 14–27) New York, NY, USA: ACM. Woo, A., Tong, T., & Culler, D. (2003). Taming the underlying challenges of reliable multihop routing in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys ’03, (pp. 14–27) New York, NY, USA: ACM.
9.
Zurück zum Zitat Wood, A.D., & Stankovic, J.A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.CrossRef Wood, A.D., & Stankovic, J.A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.CrossRef
10.
Zurück zum Zitat Wood, A.D., Stankovic, J.A., & Zhou, G. (2007). DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, (pp. 60–69). Wood, A.D., Stankovic, J.A., & Zhou, G. (2007). DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, (pp. 60–69).
11.
Zurück zum Zitat Menezes, A.J., van Oorschot, P.C., & Vanstone, S.A. (2001). Handbook of applied cryptography. Boca Raton, FL: CRC Press. Menezes, A.J., van Oorschot, P.C., & Vanstone, S.A. (2001). Handbook of applied cryptography. Boca Raton, FL: CRC Press.
12.
Zurück zum Zitat O’Flynn, C.P. (2011). Message Denial and Alteration on IEEE 802.15.4 Low-Power Radio Networks. In: 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), (pp. 1–5) O’Flynn, C.P. (2011). Message Denial and Alteration on IEEE 802.15.4 Low-Power Radio Networks. In: 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), (pp. 1–5)
13.
Zurück zum Zitat Raymond, D.R., & Midkiff, S.F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1), 74–81.CrossRef Raymond, D.R., & Midkiff, S.F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1), 74–81.CrossRef
14.
Zurück zum Zitat Noubir, G., & Lin, G. (2003). Low-power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mobile Computing Communications Review, 7, 29–30.CrossRef Noubir, G., & Lin, G. (2003). Low-power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mobile Computing Communications Review, 7, 29–30.CrossRef
15.
Zurück zum Zitat Institute of Electrical and Electronics Engineers, Inc. (2006). New York: IEEE Std. 802.15.4-2006, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specic requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs). Institute of Electrical and Electronics Engineers, Inc. (2006). New York: IEEE Std. 802.15.4-2006, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specic requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs).
16.
Zurück zum Zitat Hauer, J.H. , Daidone, R., Severino, R., Büsch, J., Tiloca, M., & Tennina, S. (2011). An Open-Source IEEE 802.15.4 MAC Implementation for TinyOS 2.1. In: Proceedings of 8th European Conference on Wireless Sensor Networks (EWSN 2011), (pp. 1–2). Hauer, J.H. , Daidone, R., Severino, R., Büsch, J., Tiloca, M., & Tennina, S. (2011). An Open-Source IEEE 802.15.4 MAC Implementation for TinyOS 2.1. In: Proceedings of 8th European Conference on Wireless Sensor Networks (EWSN 2011), (pp. 1–2).
17.
Zurück zum Zitat Lazos, L., Liu, S., & Krunz, M. (2009). Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In: Proceedings of the second ACM conference on Wireless network security, WiSec ’09. (pp. 169–180) New York, NY: ACM. Lazos, L., Liu, S., & Krunz, M. (2009). Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In: Proceedings of the second ACM conference on Wireless network security, WiSec ’09. (pp. 169–180) New York, NY: ACM.
19.
Zurück zum Zitat National Institute of Standards and Technology. (2001). Federal Information Processing Standards Publication 197, Specification for the Advanced Encryption Standard (AES). National Institute of Standards and Technology. (2001). Federal Information Processing Standards Publication 197, Specification for the Advanced Encryption Standard (AES).
21.
Zurück zum Zitat Daidone, R. (2011). Experimental Evaluations of Security Impact on IEEE 802.15.4 Networks. In: Ph.D. Forum at IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2011). Daidone, R. (2011). Experimental Evaluations of Security Impact on IEEE 802.15.4 Networks. In: Ph.D. Forum at IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2011).
22.
Zurück zum Zitat Daidone, R., Dini, G., & Tiloca, M. (2011). On experimentally evaluating the impact of security on IEEE 802.15.4 networks. In: International Conference and Workshops on Distributed Computing in Sensor Systems (DCOSS 2011), (pp. 1–6). Daidone, R., Dini, G., & Tiloca, M. (2011). On experimentally evaluating the impact of security on IEEE 802.15.4 networks. In: International Conference and Workshops on Distributed Computing in Sensor Systems (DCOSS 2011), (pp. 1–6).
23.
Zurück zum Zitat Daidone, R., Dini, G., & Tiloca, M. (2012) On preventing GTS-based Denial of Service in IEEE 802.15.4. In: European Conference on Wireless Sensor Networks, EWSN 2012 (pp. 69–70). Daidone, R., Dini, G., & Tiloca, M. (2012) On preventing GTS-based Denial of Service in IEEE 802.15.4. In: European Conference on Wireless Sensor Networks, EWSN 2012 (pp. 69–70).
24.
Zurück zum Zitat Pickholtz, R., Schilling, D., & Milstein, L. (1982). Theory of Spread-Spectrum Communications—A Tutorial. IEEE Transactions on Communications, 30(5), 855–884.CrossRef Pickholtz, R., Schilling, D., & Milstein, L. (1982). Theory of Spread-Spectrum Communications—A Tutorial. IEEE Transactions on Communications, 30(5), 855–884.CrossRef
25.
Zurück zum Zitat Sokullu, R., Korkmaz, I., & Dagdeviren, O. (2009). GTS attack: An IEEE 802.15.4 MAC layer attack in wireless sensor networks. International Journal On Advances in Internet Technologies, 2(1), 104–114. Sokullu, R., Korkmaz, I., & Dagdeviren, O. (2009). GTS attack: An IEEE 802.15.4 MAC layer attack in wireless sensor networks. International Journal On Advances in Internet Technologies, 2(1), 104–114.
26.
Zurück zum Zitat Sokullu, R., Dagdeviren, O., & Korkmaz, I. (2008). On the IEEE 802.15.4 MAC layer attacks: GTS attack. In: Proceedings of the Second International Conference on Sensor Technologies and Applications, SENSORCOMM ’08, (pp. 673–678). Sokullu, R., Dagdeviren, O., & Korkmaz, I. (2008). On the IEEE 802.15.4 MAC layer attacks: GTS attack. In: Proceedings of the Second International Conference on Sensor Technologies and Applications, SENSORCOMM ’08, (pp. 673–678).
27.
Zurück zum Zitat Anderson R.J. (2001) Security engineering: A guide to building dependable distributed systems. New York, NY: Wiley Anderson R.J. (2001) Security engineering: A guide to building dependable distributed systems. New York, NY: Wiley
28.
Zurück zum Zitat Xu, W., Ma, K., Trappe, W., & Zhang, Y. (2006). Jamming sensor networks: Attack and defense strategies. IEEE Network, 20(3), 41–47.CrossRef Xu, W., Ma, K., Trappe, W., & Zhang, Y. (2006). Jamming sensor networks: Attack and defense strategies. IEEE Network, 20(3), 41–47.CrossRef
29.
Zurück zum Zitat Xu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats: Defenses against wireless denial of service. In: Proceedings of the 3rd ACM workshop on Wireless security, WiSe ’04. (pp. 80–89) New York, NY: ACM. Xu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats: Defenses against wireless denial of service. In: Proceedings of the 3rd ACM workshop on Wireless security, WiSe ’04. (pp. 80–89) New York, NY: ACM.
30.
Zurück zum Zitat Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile ad hoc networking and computing, MobiHoc ’05, (pp. 46–57) New York, NY, USA: ACM. Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile ad hoc networking and computing, MobiHoc ’05, (pp. 46–57) New York, NY, USA: ACM.
31.
Zurück zum Zitat Law Y.W., Hartel P., den Hartog J., & Havinga P. (2005). Link-layer jamming attacks on S-MAC. In: Wireless Sensor Networks, 2005. Proceeedings of the Second European Workshop on, (pp. 217–225). Law Y.W., Hartel P., den Hartog J., & Havinga P. (2005). Link-layer jamming attacks on S-MAC. In: Wireless Sensor Networks, 2005. Proceeedings of the Second European Workshop on, (pp. 217–225).
Metadaten
Titel
A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks
verfasst von
Roberta Daidone
Gianluca Dini
Marco Tiloca
Publikationsdatum
01.07.2014
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 5/2014
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-013-0673-y

Weitere Artikel der Ausgabe 5/2014

Wireless Networks 5/2014 Zur Ausgabe

Neuer Inhalt