Skip to main content
Log in

A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The IEEE 802.15.4 standard allows devices to access the medium not only in contention mode but also in a contention-free way, in order to support quality of service (QoS). In contention-free mode, devices access the medium according to the guaranteed time slot (GTS) mechanism, which is vulnerable to the selective jamming attack. This is a particularly insidious form of denial of service that allows an attacker to thwart QoS while limiting her own exposure at the minimum. In this paper, we present selective jamming resistant GTS , a solution against the GTS-based selective jamming. We also show that our solution is standard compliant and affordable for resource-scarce devices like Tmote Sky motes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. nesC. (2004). A programming language for deeply networked systems. URL http://nescc.sourceforge.net/.

  2. TinyOS IEEE 802.15.4 Working Group. (2008). TinyOS documentation Wiki. http://www.tinyos.net/scoop/special/working_group_tinyos_154.

  3. TinyOS Home Page. (2010). URL http://www.tinyos.net/.

  4. Main tree of the TinyOS operating system for embedded, wireless devices. (2011). URL http://code.google.com/p/tinyos-main/.

  5. Texas Instruments CC2420 2.4 GHz IEEE 802.15.4 / ZigBee-ready RF Transceiver. (2012). URL http://focus.ti.com/lit/ds/symlink/cc2420.pdf.

  6. Koubaa, A., Alves, M., & Tovar, E. (2006). GTS allocation analysis in IEEE 802.15.4 for real-time wireless sensor networks. In: 20th International Parallel and Distributed Processing Symposium.

  7. Proano, A., & Lazos, L. (2010). Selective jamming attacks in wireless networks. In: 2010 IEEE International Conference on Communications, pp. 1–6.

  8. Woo, A., Tong, T., & Culler, D. (2003). Taming the underlying challenges of reliable multihop routing in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys ’03, (pp. 14–27) New York, NY, USA: ACM.

  9. Wood, A.D., & Stankovic, J.A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.

    Article  Google Scholar 

  10. Wood, A.D., Stankovic, J.A., & Zhou, G. (2007). DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, (pp. 60–69).

  11. Menezes, A.J., van Oorschot, P.C., & Vanstone, S.A. (2001). Handbook of applied cryptography. Boca Raton, FL: CRC Press.

    Google Scholar 

  12. O’Flynn, C.P. (2011). Message Denial and Alteration on IEEE 802.15.4 Low-Power Radio Networks. In: 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), (pp. 1–5)

  13. Raymond, D.R., & Midkiff, S.F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1), 74–81.

    Article  Google Scholar 

  14. Noubir, G., & Lin, G. (2003). Low-power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mobile Computing Communications Review, 7, 29–30.

    Article  Google Scholar 

  15. Institute of Electrical and Electronics Engineers, Inc. (2006). New York: IEEE Std. 802.15.4-2006, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specic requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs).

  16. Hauer, J.H. , Daidone, R., Severino, R., Büsch, J., Tiloca, M., & Tennina, S. (2011). An Open-Source IEEE 802.15.4 MAC Implementation for TinyOS 2.1. In: Proceedings of 8th European Conference on Wireless Sensor Networks (EWSN 2011), (pp. 1–2).

  17. Lazos, L., Liu, S., & Krunz, M. (2009). Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In: Proceedings of the second ACM conference on Wireless network security, WiSec ’09. (pp. 169–180) New York, NY: ACM.

  18. Moteiv Corporation:Tmote Sky: Datasheet (2006). URL http://www.snm.ethz.ch/snmwiki/pub/uploads/Projects/tmote_sky_datasheet.pdf.

  19. National Institute of Standards and Technology. (2001). Federal Information Processing Standards Publication 197, Specification for the Advanced Encryption Standard (AES).

  20. open-ZB.net:OpenSource Toolset for IEEE 802.15.4 and ZigBee (2010). URL http://www.open-zb.net/.

  21. Daidone, R. (2011). Experimental Evaluations of Security Impact on IEEE 802.15.4 Networks. In: Ph.D. Forum at IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2011).

  22. Daidone, R., Dini, G., & Tiloca, M. (2011). On experimentally evaluating the impact of security on IEEE 802.15.4 networks. In: International Conference and Workshops on Distributed Computing in Sensor Systems (DCOSS 2011), (pp. 1–6).

  23. Daidone, R., Dini, G., & Tiloca, M. (2012) On preventing GTS-based Denial of Service in IEEE 802.15.4. In: European Conference on Wireless Sensor Networks, EWSN 2012 (pp. 69–70).

  24. Pickholtz, R., Schilling, D., & Milstein, L. (1982). Theory of Spread-Spectrum Communications—A Tutorial. IEEE Transactions on Communications, 30(5), 855–884.

    Article  Google Scholar 

  25. Sokullu, R., Korkmaz, I., & Dagdeviren, O. (2009). GTS attack: An IEEE 802.15.4 MAC layer attack in wireless sensor networks. International Journal On Advances in Internet Technologies, 2(1), 104–114.

    Google Scholar 

  26. Sokullu, R., Dagdeviren, O., & Korkmaz, I. (2008). On the IEEE 802.15.4 MAC layer attacks: GTS attack. In: Proceedings of the Second International Conference on Sensor Technologies and Applications, SENSORCOMM ’08, (pp. 673–678).

  27. Anderson R.J. (2001) Security engineering: A guide to building dependable distributed systems. New York, NY: Wiley

    Google Scholar 

  28. Xu, W., Ma, K., Trappe, W., & Zhang, Y. (2006). Jamming sensor networks: Attack and defense strategies. IEEE Network, 20(3), 41–47.

    Article  Google Scholar 

  29. Xu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats: Defenses against wireless denial of service. In: Proceedings of the 3rd ACM workshop on Wireless security, WiSe ’04. (pp. 80–89) New York, NY: ACM.

  30. Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile ad hoc networking and computing, MobiHoc ’05, (pp. 46–57) New York, NY, USA: ACM.

  31. Law Y.W., Hartel P., den Hartog J., & Havinga P. (2005). Link-layer jamming attacks on S-MAC. In: Wireless Sensor Networks, 2005. Proceeedings of the Second European Workshop on, (pp. 217–225).

Download references

Acknowledgements

This work has been supported by the EU FP7 Network of Excellence CONET (Grant Agreement FP7-224053); the EU FP7 Integrated Project PLANET (Grant agreement FP7-257649); and the TENACE PRIN (No. 20103P34XC) funded by the Italian Ministry of Education, University and Research. We would like to thank Mário Alves and Ricardo Severino from ISEP, for the useful feedback received during the early stages of this work and the standard GTS implementation for TinyOS. A special thank goes to Alessandro Pischedda, for his help in the final stages of this work. Finally, we thank the anonymous reviewers for having helped us to improve our work with their precious comments and advices.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco Tiloca.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Daidone, R., Dini, G. & Tiloca, M. A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks. Wireless Netw 20, 1223–1235 (2014). https://doi.org/10.1007/s11276-013-0673-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-013-0673-y

Keywords

Navigation