Abstract
The IEEE 802.15.4 standard allows devices to access the medium not only in contention mode but also in a contention-free way, in order to support quality of service (QoS). In contention-free mode, devices access the medium according to the guaranteed time slot (GTS) mechanism, which is vulnerable to the selective jamming attack. This is a particularly insidious form of denial of service that allows an attacker to thwart QoS while limiting her own exposure at the minimum. In this paper, we present selective jamming resistant GTS , a solution against the GTS-based selective jamming. We also show that our solution is standard compliant and affordable for resource-scarce devices like Tmote Sky motes.
Similar content being viewed by others
References
nesC. (2004). A programming language for deeply networked systems. URL http://nescc.sourceforge.net/.
TinyOS IEEE 802.15.4 Working Group. (2008). TinyOS documentation Wiki. http://www.tinyos.net/scoop/special/working_group_tinyos_154.
TinyOS Home Page. (2010). URL http://www.tinyos.net/.
Main tree of the TinyOS operating system for embedded, wireless devices. (2011). URL http://code.google.com/p/tinyos-main/.
Texas Instruments CC2420 2.4 GHz IEEE 802.15.4 / ZigBee-ready RF Transceiver. (2012). URL http://focus.ti.com/lit/ds/symlink/cc2420.pdf.
Koubaa, A., Alves, M., & Tovar, E. (2006). GTS allocation analysis in IEEE 802.15.4 for real-time wireless sensor networks. In: 20th International Parallel and Distributed Processing Symposium.
Proano, A., & Lazos, L. (2010). Selective jamming attacks in wireless networks. In: 2010 IEEE International Conference on Communications, pp. 1–6.
Woo, A., Tong, T., & Culler, D. (2003). Taming the underlying challenges of reliable multihop routing in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys ’03, (pp. 14–27) New York, NY, USA: ACM.
Wood, A.D., & Stankovic, J.A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.
Wood, A.D., Stankovic, J.A., & Zhou, G. (2007). DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, (pp. 60–69).
Menezes, A.J., van Oorschot, P.C., & Vanstone, S.A. (2001). Handbook of applied cryptography. Boca Raton, FL: CRC Press.
O’Flynn, C.P. (2011). Message Denial and Alteration on IEEE 802.15.4 Low-Power Radio Networks. In: 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), (pp. 1–5)
Raymond, D.R., & Midkiff, S.F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1), 74–81.
Noubir, G., & Lin, G. (2003). Low-power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mobile Computing Communications Review, 7, 29–30.
Institute of Electrical and Electronics Engineers, Inc. (2006). New York: IEEE Std. 802.15.4-2006, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specic requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs).
Hauer, J.H. , Daidone, R., Severino, R., Büsch, J., Tiloca, M., & Tennina, S. (2011). An Open-Source IEEE 802.15.4 MAC Implementation for TinyOS 2.1. In: Proceedings of 8th European Conference on Wireless Sensor Networks (EWSN 2011), (pp. 1–2).
Lazos, L., Liu, S., & Krunz, M. (2009). Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In: Proceedings of the second ACM conference on Wireless network security, WiSec ’09. (pp. 169–180) New York, NY: ACM.
Moteiv Corporation:Tmote Sky: Datasheet (2006). URL http://www.snm.ethz.ch/snmwiki/pub/uploads/Projects/tmote_sky_datasheet.pdf.
National Institute of Standards and Technology. (2001). Federal Information Processing Standards Publication 197, Specification for the Advanced Encryption Standard (AES).
open-ZB.net:OpenSource Toolset for IEEE 802.15.4 and ZigBee (2010). URL http://www.open-zb.net/.
Daidone, R. (2011). Experimental Evaluations of Security Impact on IEEE 802.15.4 Networks. In: Ph.D. Forum at IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2011).
Daidone, R., Dini, G., & Tiloca, M. (2011). On experimentally evaluating the impact of security on IEEE 802.15.4 networks. In: International Conference and Workshops on Distributed Computing in Sensor Systems (DCOSS 2011), (pp. 1–6).
Daidone, R., Dini, G., & Tiloca, M. (2012) On preventing GTS-based Denial of Service in IEEE 802.15.4. In: European Conference on Wireless Sensor Networks, EWSN 2012 (pp. 69–70).
Pickholtz, R., Schilling, D., & Milstein, L. (1982). Theory of Spread-Spectrum Communications—A Tutorial. IEEE Transactions on Communications, 30(5), 855–884.
Sokullu, R., Korkmaz, I., & Dagdeviren, O. (2009). GTS attack: An IEEE 802.15.4 MAC layer attack in wireless sensor networks. International Journal On Advances in Internet Technologies, 2(1), 104–114.
Sokullu, R., Dagdeviren, O., & Korkmaz, I. (2008). On the IEEE 802.15.4 MAC layer attacks: GTS attack. In: Proceedings of the Second International Conference on Sensor Technologies and Applications, SENSORCOMM ’08, (pp. 673–678).
Anderson R.J. (2001) Security engineering: A guide to building dependable distributed systems. New York, NY: Wiley
Xu, W., Ma, K., Trappe, W., & Zhang, Y. (2006). Jamming sensor networks: Attack and defense strategies. IEEE Network, 20(3), 41–47.
Xu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats: Defenses against wireless denial of service. In: Proceedings of the 3rd ACM workshop on Wireless security, WiSe ’04. (pp. 80–89) New York, NY: ACM.
Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile ad hoc networking and computing, MobiHoc ’05, (pp. 46–57) New York, NY, USA: ACM.
Law Y.W., Hartel P., den Hartog J., & Havinga P. (2005). Link-layer jamming attacks on S-MAC. In: Wireless Sensor Networks, 2005. Proceeedings of the Second European Workshop on, (pp. 217–225).
Acknowledgements
This work has been supported by the EU FP7 Network of Excellence CONET (Grant Agreement FP7-224053); the EU FP7 Integrated Project PLANET (Grant agreement FP7-257649); and the TENACE PRIN (No. 20103P34XC) funded by the Italian Ministry of Education, University and Research. We would like to thank Mário Alves and Ricardo Severino from ISEP, for the useful feedback received during the early stages of this work and the standard GTS implementation for TinyOS. A special thank goes to Alessandro Pischedda, for his help in the final stages of this work. Finally, we thank the anonymous reviewers for having helped us to improve our work with their precious comments and advices.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Daidone, R., Dini, G. & Tiloca, M. A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks. Wireless Netw 20, 1223–1235 (2014). https://doi.org/10.1007/s11276-013-0673-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-013-0673-y