Abstract
The specification of Physical layer PHY and MAC layer for Low Rate Wireless Personal Area network (LR-WPAN) is provided in the IEEE 802.15.4 standard. This standard offers four services of security to protect the frames during the transmission process. Disassociation is one of features provided by the MAC layer in IEEE 802.15.4 that is sent by devices to leave the network or the coordinator PAN to force the associated device to leave the network. Wherefore, Disassociation procedure should initiate and finish between legitimate nodes to avoid DoS attacks that can affect services of the network. The aim of this paper is to analyze and review Disassociation procedure to verify the process is secure and free of weaknesses that can threaten the security in WPAN. In the analysis of Disassociation procedure, it was found that the disassociation process can face a new potential attack. This potential attack can be executed in two different scenarios based on the target node.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alabdulatif, A., Ma, X.: Analysing the EAP-TLS handshake and the 4-way handshake of the 802.11i standard. Int. J. Inf. Secur. Res. (IJISR) 3(34), 439–448 (2013)
Alabdulatif, A., Ma, X., Nolle, L.: Analysing and attacking the 4-way handshake of ieee 802.11i standard. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 382–387. IEEE (2013)
Committee, L.S., et al.: IEEE std 802.15.4-2015 (revision of IEEE std 802.15.4-2011). IEEE standard for low-rate wireless personal area networks (LR-WPANS). IEEE Computer Society (2016)
Amin, Y.M., Abdel-Hamid, A.T.: A comprehensive taxonomy and analysis of IEEE 802.15.4 attacks. J. Electr. Comput. Eng. 2016, 4 (2016)
Elijah, O., Rahman, T.A., Orikumhi, I., Leow, C.Y., Hindia, M.N.: An overview of Internet of Things (IoT) and data analytics in agriculture: benefits and challenges. IEEE Internet Things J. 5(5), 3758–3773 (2018)
Hussain, I., Negi, M.C., Pandey, N.: Security in ZIGBEE using steganography for IoT communications. In: System Performance and Management Analytics, pp. 217–227. Springer (2019)
Cheema, R., Bansal, D., Sofat, S.: Deauthentication/disassociation attack: implementation and security in wireless mesh networks. Int. J. Comput. Appl. 23(7), 7–15 (2011)
Razzaq, M.A., Gill, S.H., Qureshi, M.A., Ullah, S.: Security issues in the Internet of Things (IoT): a comprehensive study. Int. J. Adv. Comput. Sci. Appl. 8(6), 383 (2017)
Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2017)
Amoozadeh, M.: Towards Robust and Secure Collaborative Driving and Interactive Traffic Intersections. University of California, Davis (2018)
Amin, Y.M., Abdel-Hamid, A.T.: A simulation model of IEEE 802.15.4 GTS mechanism and GTS attacks in OMNET ++/MiXiM + NERA. Comput. Inf. Sci. 11(1), 78–89 (2018)
Nzabahimana, J.P.: Analysis of security and privacy challenges in Internet of Things. In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), pp. 175–178. IEEE (2018)
Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4(5), 1250–1258 (2017)
Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)
Frustaci, M., Pace, P., Aloi, G.: Securing the IoT world: issues and perspectives. In: 2017 IEEE Conference on Standards for Communications and Networking (CSCN), pp. 246–251. IEEE (2017)
Perlman, R., Kaufman, C., Speciner, M.: Network Security: Private Communication in a Public World. Pearson Education India (2016)
Acknowledgments
This work is fully supported by Qassim University by the contract no. (2337-alrasscac-2018-1-14-S).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Alabdulatif, A.A. (2020). Security Attacks in IEEE 802.15.4: A Review Disassociation Procedure. In: Saeed, F., Mohammed, F., Gazem, N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham. https://doi.org/10.1007/978-3-030-33582-3_45
Download citation
DOI: https://doi.org/10.1007/978-3-030-33582-3_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33581-6
Online ISBN: 978-3-030-33582-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)