Skip to main content

Advertisement

Log in

On the issues of selective jamming in IEEE 802.15.4-based wireless body area networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The beacon-enabled mode of IEEE 802.15.4 provides a Time Division Multiple Access (TDMA) method for low power devices by adopting Guaranteed Time Slots (GTS). GTS communication is a potential target for selective jammers where they perform GTS attacks. In GTS attacks, the adversary selectively picks one of the reserved device slots to corrupt its incoming communication. Considering countermeasures, most existing solutions rely on slot position randomization to distribute the harm of the attack over the other GTS slots. These solutions may be effective in the case of full-slot jamming. However, the introduced GTS attacks consider only TDMA property of GTS communication and ignore other important properties like the protocol behavior and the superframe structure effect on the traffic. Considering these properties while performing GTS attacks exempts the adversary from full-slot jamming and renders the existing solutions with no effect. In this paper, we introduce a new efficient version of GTS attacks that benefits from both the standard behavior and the superframe effect on the periodic traffic to conserve the adversary’s resources for the longest period. Additionally, we provide a solution specially developed to mitigate the harm from this detrimental attack. From extensive simulations conducted in this work, it follows that the attack is economic in terms of jamming duration and jamming packets ratio and the solution is efficient in terms of packet delivery ratio, energy consumption and delay overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. http://github.com/aarizaq/inetmanet-2.0

  2. https://www.omnetpp.org

References

  1. IEEE 802.15 WG (2006) IEEE Standard for Information technology– Local and metropolitan area networks– Specific requirements– Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPANs). IEEE Std 802.15.4-2006 (Revision of IEEE Std 802.15.4-2003), pp 1–320. https://doi.org/10.1109/IEEESTD.2006.232110

  2. Achour M, Mana M, Rachedi A (2018) New Slot-Head jamming attack and mitigation mechanism for wireless body area networks. In: 2018 IEEE Global communications conference: ad hoc and sensor networks (globecom2018 AHSN). Abu Dhabi, United Arab Emirates

  3. Al Masud SMR (2013) Study and analysis of scientific scopes, issues and challenges towards developing a righteous wireless body area network. Int J Soft Comput Eng (IJSCE) 3(2):243–251

    Google Scholar 

  4. Bouaziz M, Rachedi A (2016) A survey on mobility management protocols in wireless sensor networks based on 6lowpan technology. Comput. Commun 74(C):3–15. https://doi.org/10.1016/j.comcom.2014.10.004

    Article  Google Scholar 

  5. Chen F, Dressler F (2007) A simulation model of ieee 802.15. 4 in omnet++. Proc. of the 6th GI/ITG KuVS Fachgesprach Drahtlose Sensornetze (FGSN), pp 35–38

  6. Chen M, Gonzalez S, Vasilakos A, Cao H, Leung VC (2011) Body area networks: A survey. Mob. Netw. Appl 16(2):171–193. https://doi.org/10.1007/s11036-010-0260-8

    Article  Google Scholar 

  7. Daidone R, Dini G, Tiloca M (2014) A solution to the gts-based selective jamming attack on ieee 802.15.4 networks. Wirel. Netw 20(5):1223–1235. https://doi.org/10.1007/s11276-013-0673-y

    Article  Google Scholar 

  8. Dishman E (2004) Inventing wellness systems for aging in place. Computer 37(5):34–41. https://doi.org/10.1109/MC.2004.1297237,

    Article  Google Scholar 

  9. Haddadou N, Rachedi A, Ghamri-Doudane Y (2016) To send or to defer? improving the ieee 802.11p/1609.4 transmission scheme. Ad Hoc Netw 48:53–65

    Article  Google Scholar 

  10. Istepanian R, Laxminarayan S, Pattichis CS (2007) M-health: emerging mobile health systems springer science & business media

  11. Jung SS, Valero M, Bourgeois A, Beyah R (2015) Attacking and securing beacon-enabled 802.15.4 networks. Wireless Networks 21(5):1517–1535. https://doi.org/10.1007/s11276-014-0855-2

    Article  Google Scholar 

  12. Latré B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wirel. Netw 17(1):1–18. https://doi.org/10.1007/s11276-010-0252-4

    Article  Google Scholar 

  13. Mana M, Feham M, Bensaber BA (2009) Sekeban (secure and efficient key exchange for wireless body area network )

  14. Mana M, Feham M, Bensaber BA (2011) Trust key management scheme for wireless body area networks. I. J. Network Security 12:75–83

    Google Scholar 

  15. Mišić J, Shafi S, Mišić VB (2005) The impact of mac parameters on the performance of 802.15. 4 pan. Ad Hoc Networks 3(5):509–528

    Article  Google Scholar 

  16. Movassaghi S, Abolhasan M, Lipman J, Smith D, Jamalipour A (2014) Wireless body area networks: a survey. IEEE Communications Surveys Tutorials 16(3):1658–1686. https://doi.org/10.1109/SURV.2013.121313.00064

    Article  Google Scholar 

  17. Nguyen-Minh H, Benslimane A, Rachedi A (2015) Jamming detection on 802.11p under multi-channel operation in vehicular networks. In: 2015 IEEE 11Th international conference on wireless and mobile computing, networking and communications (wimob), pp. 764–770, DOI https://doi.org/10.1109/WiMOB.2015.7348039

  18. Otto C, Milenković A, Sanders C, Jovanov E (2005) System architecture of a wireless body area sensor network for ubiquitous health monitoring. J. Mob. Multimed 1(4):307–326. http://dl.acm.org/citation.cfm?id=2010498.2010502

    Google Scholar 

  19. Proano A, Lazos L (2012) Packet-hiding methods for preventing selective jamming attacks. IEEE Transactions on Dependable and Secure Computing 9(1):101–114. https://doi.org/10.1109/TDSC.2011.41

    Article  Google Scholar 

  20. Rachedi A, Benslimane A (2016) Multi-objective optimization for security and qos adaptation in wireless sensor networks. In: 2016 IEEE International conference on communications (ICC), pp. 1–7, DOI https://doi.org/10.1109/ICC.2016.7510879

  21. Sharma VK, Kumar M (2017) Adaptive congestion control scheme in mobile ad-hoc networks. Peer-to-Peer Networking and Applications 10(3):633–657

    Article  Google Scholar 

  22. Sharma VK, Kumar M (2019) Adaptive load distribution approach based on congestion control scheme in ad-hoc networks. Int J Electron 106(1):48–68

    Article  Google Scholar 

  23. Sharma VK, Verma LP, Kumar M (2018) A fuzzy-based adaptive energy efficient load distribution scheme in ad-hoc networks. International Journal of Intelligent Systems and Applications 11(2):72

    Article  Google Scholar 

  24. Sokullu R, Dagdeviren O, Korkmaz I (2008) On the ieee 802.15.4 mac layer attacks: Gts attack. In: 2008 Second international conference on sensor technologies and applications (sensorcomm 2008), pp. 673–678, DOI https://doi.org/10.1109/SENSORCOMM.2008.75

  25. Sokullu R, Korkmaz I, Dagdeviren O (2009) Gts attack:, An ieee 802.15. 4 mac layer attack in wireless sensor networks. International Journal On Advances in Internet Technologies 2(1):104–114

    Google Scholar 

  26. Tiloca M, De Guglielmo D, Dini G, Anastasi G, Das SK (2018) Dish: Distributed shuffling against selective jamming attack in ieee 802.15. 4e tsch networks ACM transactions on sensor networks

  27. Tiloca M, Guglielmo DD, Dini G, Anastasi G, Das SK (2017) Jammy: a distributed and dynamic solution to selective jamming attack in tdma wsns. IEEE Transactions on Dependable and Secure Computing 14(4):392–405. https://doi.org/10.1109/TDSC.2015.2467391

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M’hammed Achour.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Considering the two boundaries of an arbitrary turn of the period P, we define three parts constituting this turn;

  1. (1)

    The difference between the start of the node slot that follows the first boundary and the boundary itself. We refer to this period as the head.

  2. (2)

    The period between the first and last slot start located in the turn. We refer to this period as the body.

  3. (3)

    The difference between the second boundary and the last slot start located in the turn. We refer to this period as the tail.

We refer to the period between the first boundary and the start of the node slot that precedes this boundary as the shift.

Figure 11 illustrates these three parts.

Fig. 11
figure 11

An arbitrary turn of P with the introduced three parts: head, body and tail

Let N be the number of superframes between two successive transmissions affected by the IEEE 802.15.4 MAC layer and let slot and SF be the slot duration and full superframe duration, respectively.

The goal of the Appendix is proving the following:

$$ \begin{array}{@{}rcl@{}} P div_{float} SF \leq N \leq P div_{float} SF + 1 \end{array} $$

Firstly, we have:

$$ N = pre\_delaying + |body| + post\_delaying $$

Where:

  • - pre_delaying is a number determining whether there is a delay in the beginning of the turn. This variable takes 0 in the case of delay and 1 otherwise.

  • - |body| is the number of superframes in body.

  • - post_delaying is the number of deferrals caused by the tail.

  • Assuming that shift = 0:

    In this case, it is obvious that head = 0, body = (PdivfloatSF) × SF and tail = PmodfloatSF.

    Thus, pre_delaying = 0 and |body| = PdivfloatSF.

    Since PmodfloatSF < SF, then the second packet arrival can at most be delayed once. Then post_delaying ≤ 1.

    As a result: PdivfloatSFNPdivfloatSF + 1.

  • Assuming that shift≠ 0:

    We have

    $$ \begin{array}{@{}rcl@{}} body &=&P - (SF-shift) - (P mod_{float}SF + shift) \\ &=&P-SF+shift- P mod_{float}SF-shift \\ &=&P-SF- P mod_{float}SF \end{array} $$

    Since P = (PdivfloatSF) × SF + PmodfloatSF,then,

    $$ \begin{array}{@{}rcl@{}} body &=& (P div_{float}SF) \times SF+P mod_{float}SF-SF \\ &&\quad -P mod_{float}SF \\ &=&(P div_{float}SF) \times SF-SF \\ body &=& (P div_{float}SF - 1) \times SF \end{array} $$

    Therefore,

    |body| = PdivfloatSF − 1

    Since |body| is constant, finding a boundary for N implies finding a boundary for pre_delaying and post_delaying.

    Since shift + head = SF then 0 ≤ shiftSF.

    Consequently, we have two possibilities:

    0 ≤ shift < slot and slotshiftSF, which implies pre_delaying = 1 and pre_delaying = 0, respectively.

    Thus

    $$ 0 \leq pre\_delaying \leq 1 $$

    On the other hand, we have:

    $$ P mod_{float}SF<SF \ \text{and}\ shift<SF $$

    Then

    $$ P mod_{float}SF+ shift<2 \times SF $$

    Therefore

    $$ tail<2 \times SF $$

    As a consequence, we have three possibilities:

    0 ≤ tail < slot, slottail < SF + slot and SF + slottail < 2 × SF, which implies post_delaying = 0, post_delaying = 1 and post_delaying = 2.

    Thus

    $$ 0 \leq post\_delaying \leq 2 $$

    Therefore

    $$ \begin{array}{lll} P div_{float}SF - 1 & \leq & pre\_delaying + |body| \\ &&+ post\_delaying \\ & \leq & P div_{float}SF +2 \end{array} $$

    Now, we have to prove that this sum cannot take the inequality boundaries i.e., PdivfloatSF − 1 and PdivfloatSF + 2.

    Since pre_delaying has 0 and 1 as possible values and post_delaying can take the values 0, 1 and 2, it is sufficient to prove that pre_delaying inevitably takes 0 when post_delaying takes 2 and takes 1 when post_delaying takes 0.

    • Suppose that post_delaying = 2:

      This implies

      $$ tail \geq SF+slot $$

      Which is equivalent to:

      $$ P mod_{float}SF+ shift \geq SF+slot $$

      Thus

      $$ shift \geq SF+slot- P mod_{float}SF $$

      Since

      $$ P mod_{float}SF<SF $$

      Then

      $$ shift>slot $$

      Therefore, the first transmission is undeniably deferred, which means pre_delaying = 0.

    • post_delaying = 0

      This means

      $$ tail<slot $$

      i.e.

      $$ P mod_{float}SF+ shift<slot $$

      Then

      $$ shift<slot $$

      Therefore, the first transmission is not deferred, which means pre_delaying = 1.

      This results on:

      $$ \begin{array}{lll} P div_{float}SF & \leq & pre\_delaying + |body| \\ &&+ post\_delaying \\ & \leq & P div_{float}SF +1 \end{array} $$

      i.e. PdivfloatSFNPdivfloatSF + 1

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Achour, M., MANA, M. & Rachedi, A. On the issues of selective jamming in IEEE 802.15.4-based wireless body area networks. Peer-to-Peer Netw. Appl. 14, 135–150 (2021). https://doi.org/10.1007/s12083-020-00988-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00988-1

Keywords

Navigation