van Hoesel, L.F.W. and Law, Yee Wei and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M.
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
Technical Report TR-CTIT-06-18,
Centre for Telematics and Information Technology University of Twente, Enschede.
Full text available as:
A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting
knowledge of the data link layer. Encrypting the packets may help to prevent the jammer from taking actions based on the content of the packets, but the temporal arrangement of the packets induced by the nature of the protocol might unravel patterns that the jammer can take advantage of, even when the packets are encrypted.
By looking at the packet interarrival times in three representative MAC protocols, S-MAC, LMAC and B-MAC, we derive several jamming attacks that allow the jammer to jam S-MAC, LMAC and B-MAC energy-efficiently. The jamming
attacks are based on realistic assumptions. The algorithms are described in detail and simulated. The effectiveness and efficiency of the attacks are examined. In addition, we validate our simulation model by comparing its results with measurements obtained from implementation on sensor node prototypes. We show that it takes little effort to implement such effective jammers, making them a realistic
Careful analysis of other protocols belonging to the respective categories of S-MAC, LMAC and B-MAC reveals that those protocols are, to some extent, also susceptible to our attacks. The result of this investigation provides new insights into the security considerations of MAC protocols.
|Item Type:||Internal Report (Technical Report)|
|Research Group:||EWI-CAES: Computer Architecture for Embedded Systems, EWI-DIES: Distributed and Embedded Security|
|Research Program:||CTIT-UBRICKS: Building Blocks for Ubiquitous Computing and Communication|
|Research Project:||Embedded WiSeNts: Wireless Sensor Networks -- Omnipresent Embedded Systems for Exploration and Control|
|Deposited On:||07 June 2006|
Export this item as:
To correct this item please ask your editor
Repository Staff Only: edit this item