Document Type
Article
Publication Date
Spring 3-20-2020
Abstract
The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for wireless sensor nodes, where the malicious node is deployed as an inside attacker. We show that the malicious node can freely exploit information retrieved from the beacon frames to compromise the integrity and availability of the network. To defend against these attacks, we present BCN-Sec, a protocol that ensures the integrity of data and control frames in beacon-enabled 802.15.4 networks. We implement BCN-Sec, and show its efficacy during various attacks.
Recommended Citation
Jung, S.S., Valero, M., Bourgeois, A. et al. Attacking and securing beacon-enabled 802.15.4 networks. Wireless Netw 21, 1517–1535 (2015). https://doi.org/10.1007/s11276-014-0855-2
Included in
Criminology and Criminal Justice Commons, Defense and Security Studies Commons, Information Security Commons
Comments
Publisher version available at https://doi.org/10.1007/s11276-014-0855-2. The archived and publisher version may slightly differ due to copyediting. To learn more about the Andrew Young School of Policy Studies and Evidence-Based Cybersecurity Research Group, visit https://aysps.gsu.edu/ and ebcs.gsu.edu.