Loading…

On the issues of selective jamming in IEEE 802.15.4-based wireless body area networks

The beacon-enabled mode of IEEE 802.15.4 provides a Time Division Multiple Access (TDMA) method for low power devices by adopting Guaranteed Time Slots (GTS). GTS communication is a potential target for selective jammers where they perform GTS attacks. In GTS attacks, the adversary selectively picks...

Full description

Saved in:
Bibliographic Details
Published in:Peer-to-peer networking and applications 2021-01, Vol.14 (1), p.135-150
Main Authors: Achour, M’hammed, MANA, Mohammed, Rachedi, Abderrezak
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The beacon-enabled mode of IEEE 802.15.4 provides a Time Division Multiple Access (TDMA) method for low power devices by adopting Guaranteed Time Slots (GTS). GTS communication is a potential target for selective jammers where they perform GTS attacks. In GTS attacks, the adversary selectively picks one of the reserved device slots to corrupt its incoming communication. Considering countermeasures, most existing solutions rely on slot position randomization to distribute the harm of the attack over the other GTS slots. These solutions may be effective in the case of full-slot jamming. However, the introduced GTS attacks consider only TDMA property of GTS communication and ignore other important properties like the protocol behavior and the superframe structure effect on the traffic. Considering these properties while performing GTS attacks exempts the adversary from full-slot jamming and renders the existing solutions with no effect. In this paper, we introduce a new efficient version of GTS attacks that benefits from both the standard behavior and the superframe effect on the periodic traffic to conserve the adversary’s resources for the longest period. Additionally, we provide a solution specially developed to mitigate the harm from this detrimental attack. From extensive simulations conducted in this work, it follows that the attack is economic in terms of jamming duration and jamming packets ratio and the solution is efficient in terms of packet delivery ratio, energy consumption and delay overhead.
ISSN:1936-6442
1936-6450
DOI:10.1007/s12083-020-00988-1