Loading...
Thumbnail Image
Item

Attacking and securing beacon-enabled 802.15.4 networks

Jung, Sang Shin
Valero, Marco
Bourgeois, Anu G.
Beyah, Raheem
Citations
Altmetric:
Abstract

The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for wireless sensor nodes, where the malicious node is deployed as an inside attacker. We show that the malicious node can freely exploit information retrieved from the beacon frames to compromise the integrity and availability of the network. To defend against these attacks, we present BCN-Sec, a protocol that ensures the integrity of data and control frames in beacon-enabled 802.15.4 networks. We implement BCN-Sec, and show its efficacy during various attacks.

Comments
<p>Publisher version available at https://doi.org/10.1007/s11276-014-0855-2. The archived and publisher version may slightly differ due to copyediting. To learn more about the Andrew Young School of Policy Studies and Evidence-Based Cybersecurity Research Group, visit <a href="https://aysps.gsu.edu/" target="_blank">https://aysps.gsu.edu/</a> and ebcs.gsu.edu.</p>
Description
Date
2020-03-20
Journal Title
Journal ISSN
Volume Title
Publisher
Collections
Research Projects
Organizational Units
Journal Issue
Keywords
Beacon-enabled 802.15.4, Insider attacks, Media access control, MAC misbehavior, Time-critical applications, Wireless sensor networks
Citation
Jung, S.S., Valero, M., Bourgeois, A. et al. Attacking and securing beacon-enabled 802.15.4 networks. Wireless Netw 21, 1517–1535 (2015). https://doi.org/10.1007/s11276-014-0855-2
Embargo Lift Date
DOI
Embedded videos