Abstract
The beacon-enabled mode of IEEE 802.15.4 provides a Time Division Multiple Access (TDMA) method for low power devices by adopting Guaranteed Time Slots (GTS). GTS communication is a potential target for selective jammers where they perform GTS attacks. In GTS attacks, the adversary selectively picks one of the reserved device slots to corrupt its incoming communication. Considering countermeasures, most existing solutions rely on slot position randomization to distribute the harm of the attack over the other GTS slots. These solutions may be effective in the case of full-slot jamming. However, the introduced GTS attacks consider only TDMA property of GTS communication and ignore other important properties like the protocol behavior and the superframe structure effect on the traffic. Considering these properties while performing GTS attacks exempts the adversary from full-slot jamming and renders the existing solutions with no effect. In this paper, we introduce a new efficient version of GTS attacks that benefits from both the standard behavior and the superframe effect on the periodic traffic to conserve the adversary’s resources for the longest period. Additionally, we provide a solution specially developed to mitigate the harm from this detrimental attack. From extensive simulations conducted in this work, it follows that the attack is economic in terms of jamming duration and jamming packets ratio and the solution is efficient in terms of packet delivery ratio, energy consumption and delay overhead.
Similar content being viewed by others
Notes
http://github.com/aarizaq/inetmanet-2.0
https://www.omnetpp.org
References
IEEE 802.15 WG (2006) IEEE Standard for Information technology– Local and metropolitan area networks– Specific requirements– Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPANs). IEEE Std 802.15.4-2006 (Revision of IEEE Std 802.15.4-2003), pp 1–320. https://doi.org/10.1109/IEEESTD.2006.232110
Achour M, Mana M, Rachedi A (2018) New Slot-Head jamming attack and mitigation mechanism for wireless body area networks. In: 2018 IEEE Global communications conference: ad hoc and sensor networks (globecom2018 AHSN). Abu Dhabi, United Arab Emirates
Al Masud SMR (2013) Study and analysis of scientific scopes, issues and challenges towards developing a righteous wireless body area network. Int J Soft Comput Eng (IJSCE) 3(2):243–251
Bouaziz M, Rachedi A (2016) A survey on mobility management protocols in wireless sensor networks based on 6lowpan technology. Comput. Commun 74(C):3–15. https://doi.org/10.1016/j.comcom.2014.10.004
Chen F, Dressler F (2007) A simulation model of ieee 802.15. 4 in omnet++. Proc. of the 6th GI/ITG KuVS Fachgesprach Drahtlose Sensornetze (FGSN), pp 35–38
Chen M, Gonzalez S, Vasilakos A, Cao H, Leung VC (2011) Body area networks: A survey. Mob. Netw. Appl 16(2):171–193. https://doi.org/10.1007/s11036-010-0260-8
Daidone R, Dini G, Tiloca M (2014) A solution to the gts-based selective jamming attack on ieee 802.15.4 networks. Wirel. Netw 20(5):1223–1235. https://doi.org/10.1007/s11276-013-0673-y
Dishman E (2004) Inventing wellness systems for aging in place. Computer 37(5):34–41. https://doi.org/10.1109/MC.2004.1297237,
Haddadou N, Rachedi A, Ghamri-Doudane Y (2016) To send or to defer? improving the ieee 802.11p/1609.4 transmission scheme. Ad Hoc Netw 48:53–65
Istepanian R, Laxminarayan S, Pattichis CS (2007) M-health: emerging mobile health systems springer science & business media
Jung SS, Valero M, Bourgeois A, Beyah R (2015) Attacking and securing beacon-enabled 802.15.4 networks. Wireless Networks 21(5):1517–1535. https://doi.org/10.1007/s11276-014-0855-2
Latré B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wirel. Netw 17(1):1–18. https://doi.org/10.1007/s11276-010-0252-4
Mana M, Feham M, Bensaber BA (2009) Sekeban (secure and efficient key exchange for wireless body area network )
Mana M, Feham M, Bensaber BA (2011) Trust key management scheme for wireless body area networks. I. J. Network Security 12:75–83
Mišić J, Shafi S, Mišić VB (2005) The impact of mac parameters on the performance of 802.15. 4 pan. Ad Hoc Networks 3(5):509–528
Movassaghi S, Abolhasan M, Lipman J, Smith D, Jamalipour A (2014) Wireless body area networks: a survey. IEEE Communications Surveys Tutorials 16(3):1658–1686. https://doi.org/10.1109/SURV.2013.121313.00064
Nguyen-Minh H, Benslimane A, Rachedi A (2015) Jamming detection on 802.11p under multi-channel operation in vehicular networks. In: 2015 IEEE 11Th international conference on wireless and mobile computing, networking and communications (wimob), pp. 764–770, DOI https://doi.org/10.1109/WiMOB.2015.7348039
Otto C, Milenković A, Sanders C, Jovanov E (2005) System architecture of a wireless body area sensor network for ubiquitous health monitoring. J. Mob. Multimed 1(4):307–326. http://dl.acm.org/citation.cfm?id=2010498.2010502
Proano A, Lazos L (2012) Packet-hiding methods for preventing selective jamming attacks. IEEE Transactions on Dependable and Secure Computing 9(1):101–114. https://doi.org/10.1109/TDSC.2011.41
Rachedi A, Benslimane A (2016) Multi-objective optimization for security and qos adaptation in wireless sensor networks. In: 2016 IEEE International conference on communications (ICC), pp. 1–7, DOI https://doi.org/10.1109/ICC.2016.7510879
Sharma VK, Kumar M (2017) Adaptive congestion control scheme in mobile ad-hoc networks. Peer-to-Peer Networking and Applications 10(3):633–657
Sharma VK, Kumar M (2019) Adaptive load distribution approach based on congestion control scheme in ad-hoc networks. Int J Electron 106(1):48–68
Sharma VK, Verma LP, Kumar M (2018) A fuzzy-based adaptive energy efficient load distribution scheme in ad-hoc networks. International Journal of Intelligent Systems and Applications 11(2):72
Sokullu R, Dagdeviren O, Korkmaz I (2008) On the ieee 802.15.4 mac layer attacks: Gts attack. In: 2008 Second international conference on sensor technologies and applications (sensorcomm 2008), pp. 673–678, DOI https://doi.org/10.1109/SENSORCOMM.2008.75
Sokullu R, Korkmaz I, Dagdeviren O (2009) Gts attack:, An ieee 802.15. 4 mac layer attack in wireless sensor networks. International Journal On Advances in Internet Technologies 2(1):104–114
Tiloca M, De Guglielmo D, Dini G, Anastasi G, Das SK (2018) Dish: Distributed shuffling against selective jamming attack in ieee 802.15. 4e tsch networks ACM transactions on sensor networks
Tiloca M, Guglielmo DD, Dini G, Anastasi G, Das SK (2017) Jammy: a distributed and dynamic solution to selective jamming attack in tdma wsns. IEEE Transactions on Dependable and Secure Computing 14(4):392–405. https://doi.org/10.1109/TDSC.2015.2467391
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
Considering the two boundaries of an arbitrary turn of the period P, we define three parts constituting this turn;
-
(1)
The difference between the start of the node slot that follows the first boundary and the boundary itself. We refer to this period as the head.
-
(2)
The period between the first and last slot start located in the turn. We refer to this period as the body.
-
(3)
The difference between the second boundary and the last slot start located in the turn. We refer to this period as the tail.
We refer to the period between the first boundary and the start of the node slot that precedes this boundary as the shift.
Figure 11 illustrates these three parts.
Let N be the number of superframes between two successive transmissions affected by the IEEE 802.15.4 MAC layer and let slot and SF be the slot duration and full superframe duration, respectively.
The goal of the Appendix is proving the following:
Firstly, we have:
Where:
-
- pre_delaying is a number determining whether there is a delay in the beginning of the turn. This variable takes 0 in the case of delay and 1 otherwise.
-
- |body| is the number of superframes in body.
-
- post_delaying is the number of deferrals caused by the tail.
-
Assuming that shift = 0:
In this case, it is obvious that head = 0, body = (PdivfloatSF) × SF and tail = PmodfloatSF.
Thus, pre_delaying = 0 and |body| = PdivfloatSF.
Since PmodfloatSF < SF, then the second packet arrival can at most be delayed once. Then post_delaying ≤ 1.
As a result: PdivfloatSF ≤ N ≤ PdivfloatSF + 1.
-
Assuming that shift≠ 0:
We have
$$ \begin{array}{@{}rcl@{}} body &=&P - (SF-shift) - (P mod_{float}SF + shift) \\ &=&P-SF+shift- P mod_{float}SF-shift \\ &=&P-SF- P mod_{float}SF \end{array} $$Since P = (PdivfloatSF) × SF + PmodfloatSF,then,
$$ \begin{array}{@{}rcl@{}} body &=& (P div_{float}SF) \times SF+P mod_{float}SF-SF \\ &&\quad -P mod_{float}SF \\ &=&(P div_{float}SF) \times SF-SF \\ body &=& (P div_{float}SF - 1) \times SF \end{array} $$Therefore,
|body| = PdivfloatSF − 1
Since |body| is constant, finding a boundary for N implies finding a boundary for pre_delaying and post_delaying.
Since shift + head = SF then 0 ≤ shift ≤ SF.
Consequently, we have two possibilities:
0 ≤ shift < slot and slot ≤ shift ≤ SF, which implies pre_delaying = 1 and pre_delaying = 0, respectively.
Thus
$$ 0 \leq pre\_delaying \leq 1 $$On the other hand, we have:
$$ P mod_{float}SF<SF \ \text{and}\ shift<SF $$Then
$$ P mod_{float}SF+ shift<2 \times SF $$Therefore
$$ tail<2 \times SF $$As a consequence, we have three possibilities:
0 ≤ tail < slot, slot ≤ tail < SF + slot and SF + slot ≤ tail < 2 × SF, which implies post_delaying = 0, post_delaying = 1 and post_delaying = 2.
Thus
$$ 0 \leq post\_delaying \leq 2 $$Therefore
$$ \begin{array}{lll} P div_{float}SF - 1 & \leq & pre\_delaying + |body| \\ &&+ post\_delaying \\ & \leq & P div_{float}SF +2 \end{array} $$Now, we have to prove that this sum cannot take the inequality boundaries i.e., PdivfloatSF − 1 and PdivfloatSF + 2.
Since pre_delaying has 0 and 1 as possible values and post_delaying can take the values 0, 1 and 2, it is sufficient to prove that pre_delaying inevitably takes 0 when post_delaying takes 2 and takes 1 when post_delaying takes 0.
-
Suppose that post_delaying = 2:
This implies
$$ tail \geq SF+slot $$Which is equivalent to:
$$ P mod_{float}SF+ shift \geq SF+slot $$Thus
$$ shift \geq SF+slot- P mod_{float}SF $$Since
$$ P mod_{float}SF<SF $$Then
$$ shift>slot $$Therefore, the first transmission is undeniably deferred, which means pre_delaying = 0.
-
post_delaying = 0
This means
$$ tail<slot $$i.e.
$$ P mod_{float}SF+ shift<slot $$Then
$$ shift<slot $$Therefore, the first transmission is not deferred, which means pre_delaying = 1.
This results on:
$$ \begin{array}{lll} P div_{float}SF & \leq & pre\_delaying + |body| \\ &&+ post\_delaying \\ & \leq & P div_{float}SF +1 \end{array} $$i.e. PdivfloatSF ≤ N ≤ PdivfloatSF + 1
-
Rights and permissions
About this article
Cite this article
Achour, M., MANA, M. & Rachedi, A. On the issues of selective jamming in IEEE 802.15.4-based wireless body area networks. Peer-to-Peer Netw. Appl. 14, 135–150 (2021). https://doi.org/10.1007/s12083-020-00988-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-00988-1