Skip to main content

Security Attacks in IEEE 802.15.4: A Review Disassociation Procedure

  • Conference paper
  • First Online:
  • 1552 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1073))

Abstract

The specification of Physical layer PHY and MAC layer for Low Rate Wireless Personal Area network (LR-WPAN) is provided in the IEEE 802.15.4 standard. This standard offers four services of security to protect the frames during the transmission process. Disassociation is one of features provided by the MAC layer in IEEE 802.15.4 that is sent by devices to leave the network or the coordinator PAN to force the associated device to leave the network. Wherefore, Disassociation procedure should initiate and finish between legitimate nodes to avoid DoS attacks that can affect services of the network. The aim of this paper is to analyze and review Disassociation procedure to verify the process is secure and free of weaknesses that can threaten the security in WPAN. In the analysis of Disassociation procedure, it was found that the disassociation process can face a new potential attack. This potential attack can be executed in two different scenarios based on the target node.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Alabdulatif, A., Ma, X.: Analysing the EAP-TLS handshake and the 4-way handshake of the 802.11i standard. Int. J. Inf. Secur. Res. (IJISR) 3(34), 439–448 (2013)

    Google Scholar 

  2. Alabdulatif, A., Ma, X., Nolle, L.: Analysing and attacking the 4-way handshake of ieee 802.11i standard. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 382–387. IEEE (2013)

    Google Scholar 

  3. Committee, L.S., et al.: IEEE std 802.15.4-2015 (revision of IEEE std 802.15.4-2011). IEEE standard for low-rate wireless personal area networks (LR-WPANS). IEEE Computer Society (2016)

    Google Scholar 

  4. Amin, Y.M., Abdel-Hamid, A.T.: A comprehensive taxonomy and analysis of IEEE 802.15.4 attacks. J. Electr. Comput. Eng. 2016, 4 (2016)

    Google Scholar 

  5. Elijah, O., Rahman, T.A., Orikumhi, I., Leow, C.Y., Hindia, M.N.: An overview of Internet of Things (IoT) and data analytics in agriculture: benefits and challenges. IEEE Internet Things J. 5(5), 3758–3773 (2018)

    Article  Google Scholar 

  6. Hussain, I., Negi, M.C., Pandey, N.: Security in ZIGBEE using steganography for IoT communications. In: System Performance and Management Analytics, pp. 217–227. Springer (2019)

    Google Scholar 

  7. Cheema, R., Bansal, D., Sofat, S.: Deauthentication/disassociation attack: implementation and security in wireless mesh networks. Int. J. Comput. Appl. 23(7), 7–15 (2011)

    Google Scholar 

  8. Razzaq, M.A., Gill, S.H., Qureshi, M.A., Ullah, S.: Security issues in the Internet of Things (IoT): a comprehensive study. Int. J. Adv. Comput. Sci. Appl. 8(6), 383 (2017)

    Google Scholar 

  9. Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2017)

    Article  Google Scholar 

  10. Amoozadeh, M.: Towards Robust and Secure Collaborative Driving and Interactive Traffic Intersections. University of California, Davis (2018)

    Google Scholar 

  11. Amin, Y.M., Abdel-Hamid, A.T.: A simulation model of IEEE 802.15.4 GTS mechanism and GTS attacks in OMNET ++/MiXiM + NERA. Comput. Inf. Sci. 11(1), 78–89 (2018)

    Google Scholar 

  12. Nzabahimana, J.P.: Analysis of security and privacy challenges in Internet of Things. In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), pp. 175–178. IEEE (2018)

    Google Scholar 

  13. Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4(5), 1250–1258 (2017)

    Article  Google Scholar 

  14. Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  15. Frustaci, M., Pace, P., Aloi, G.: Securing the IoT world: issues and perspectives. In: 2017 IEEE Conference on Standards for Communications and Networking (CSCN), pp. 246–251. IEEE (2017)

    Google Scholar 

  16. Perlman, R., Kaufman, C., Speciner, M.: Network Security: Private Communication in a Public World. Pearson Education India (2016)

    Google Scholar 

Download references

Acknowledgments

This work is fully supported by Qassim University by the contract no. (2337-alrasscac-2018-1-14-S).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdullah A. Alabdulatif .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alabdulatif, A.A. (2020). Security Attacks in IEEE 802.15.4: A Review Disassociation Procedure. In: Saeed, F., Mohammed, F., Gazem, N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham. https://doi.org/10.1007/978-3-030-33582-3_45

Download citation

Publish with us

Policies and ethics