EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


15102 Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols
Home Policy Brochure Browse Search User Area Contact Help

Law, Yee Wei and Palaniswami, M. and van Hoesel, L.F.W. and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2009) Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks, 5 (1). 6:1-6:38. ISSN 1550-4859 *** ISI Impact 1,448 ***

Full text available as:

PDF
- Univ. of Twente only
865 Kb

Official URL: http://dx.doi.org/10.1145/1464420.1464426

Exported to Metis

Abstract

A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help to prevent the jammer from taking actions based on the content of the packets, but the temporal arrangement of the packets induced by the nature of the protocol might unravel patterns that the jammer can take advantage of, even when the packets are encrypted.

By looking at the packet interarrival times in three representative MAC protocols, S-MAC, LMAC, and B-MAC, we derive several jamming attacks that allow the jammer to jam S-MAC, LMAC, and B-MAC energy efficiently. The jamming attacks are based on realistic assumptions. The algorithms are described in detail and simulated. The effectiveness and efficiency of the attacks are examined. In addition, we validate our simulation model by comparing its results with measurements obtained from actual implementation on our sensor node prototypes. We show that it takes little effort to implement such effective jammers, making them a realistic threat.

Careful analysis of other protocols belonging to the respective categories of S-MAC, LMAC, and B-MAC reveals that those protocols are, to some extent, also susceptible to our attacks. The result of this investigation provides new insights into the security considerations of MAC protocols.

Item Type:Article
Research Group:EWI-DIES: Distributed and Embedded Security, EWI-PS: Pervasive Systems
Research Program:CTIT-WiSe: Wireless and Sensor Systems
Research Project:Aware: Platform for Autonomous self-deploying and operation of Wireless sensor-actuator networks cooperating with AeRial objEcts, EYES: Energy-Efficient Sensor Networks
ID Code:15102
Status:Published
Deposited On:12 February 2009
Refereed:Yes
International:Yes
ISI Impact Factor:1,448
More Information:statisticsmetis

Export this item as:

To request a copy of the PDF please email us request copy

To correct this item please ask your editor

Repository Staff Only: edit this item