Affiliation:
1. The University of Melbourne, Parkville, Victoria, Australia
2. University of Twente, Enschede, The Netherlands
Abstract
A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help to prevent the jammer from taking actions based on the content of the packets, but the temporal arrangement of the packets induced by the nature of the protocol might unravel patterns that the jammer can take advantage of, even when the packets are encrypted.
By looking at the packet interarrival times in three representative MAC protocols, S-MAC, LMAC, and B-MAC, we derive several jamming attacks that allow the jammer to jam S-MAC, LMAC, and B-MAC energy efficiently. The jamming attacks are based on realistic assumptions. The algorithms are described in detail and simulated. The effectiveness and efficiency of the attacks are examined. In addition, we validate our simulation model by comparing its results with measurements obtained from actual implementation on our sensor node prototypes. We show that it takes little effort to implement such effective jammers, making them a realistic threat.
Careful analysis of other protocols belonging to the respective categories of S-MAC, LMAC, and B-MAC reveals that those protocols are, to some extent, also susceptible to our attacks. The result of this investigation provides new insights into the security considerations of MAC protocols.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications
Reference70 articles.
1. Adamy D. L. and Adamy D. 2004. EW 102: A Second Course in Electronic Warfare. Artech House Publishers. Adamy D. L. and Adamy D. 2004. EW 102: A Second Course in Electronic Warfare. Artech House Publishers.
2. Wireless sensor and actor networks: research challenges
3. Wireless sensor networks: a survey
4. Coin flipping by telephone a protocol for solving impossible problems
Cited by
87 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献