...
首页> 外文期刊>ACM transactions on sensor networks >Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols
【24h】

Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols

机译:针对无线传感器网络MAC协议的高能效链路层干扰攻击

获取原文
获取原文并翻译 | 示例
           

摘要

A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help to prevent the jammer from taking actions based on the content of the packets, but the temporal arrangement of the packets induced by the nature of the protocol might unravel patterns that the jammer can take advantage of, even when the packets are encrypted.rnBy looking at the packet interarrival times in three representative MAC protocols, S-MAC, LMAC, and B-MAC, we derive several jamming attacks that allow the jammer to jam S-MAC, LMAC, and B-MAC energy efficiently. The jamming attacks are based on realistic assumptions. The algorithms are described in detail and simulated. The effectiveness and efficiency of the attacks are examined. In addition, we validate our simulation model by comparing its results with measurements obtained from actual implementation on our sensor node prototypes. We show that it takes little effort to implement such effective jammers, making them a realistic threat.rnCareful analysis of other protocols belonging to the respective categories of S-MAC, LMAC, and B-MAC reveals that those protocols are, to some extent, also susceptible to our attacks. The result of this investigation provides new insights into the security considerations of MAC protocols.
机译:典型的无线传感器节点几乎无法防止无线电干扰。如果可以通过利用数据链路层的知识来实现​​高能效的干扰,情况将变得更糟。对数据包进行加密可以帮助防止干扰程序根据数据包的内容采取措施,但是由协议的性质引起的数据包的时间安排可能会弄乱干扰程序可以利用的模式,即使数据包是通过查看三种代表性的MAC协议S-MAC,LMAC和B-MAC中的数据包到达时间,我们得出了几种干扰攻击,这些干扰使干扰器能够有效地干扰S-MAC,LMAC和B-MAC能量。干扰攻击基于现实的假设。对算法进行了详细描述和仿真。检查了攻击的有效性和效率。此外,我们通过将仿真结果与实际在传感器节点原型上获得的测量结果进行比较来验证仿真模型。我们表明,实施这种有效的干扰器几乎不需要花力气,这使其成为现实威胁.rn对属于S-MAC,LMAC和B-MAC各自类别的其他协议的仔细分析表明,这些协议在某种程度上是,也容易受到我们的攻击。调查的结果为MAC协议的安全性考虑提供了新的见解。

著录项

  • 来源
    《ACM transactions on sensor networks》 |2009年第1期|167-204|共38页
  • 作者单位

    Department of Electrical and Electronic Engineering, The University of Melbourne, Parkville, Victoria 3052, Australia;

    Department of Electrical and Electronic Engineering, The University of Melbourne, Parkville, Victoria 3052, Australia;

    Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, P.O. Box 217, 7500 AE Enschede, The Netherlands;

    Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, P.O. Box 217, 7500 AE Enschede, The Netherlands;

    Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, P.O. Box 217, 7500 AE Enschede, The Netherlands;

    Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, P.O. Box 217, 7500 AE Enschede, The Netherlands;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    MAC protocols; denial-of-service attacks; jamming; clustering; expectation maximization;

    机译:MAC协议;拒绝服务攻击;干扰集群期望最大化;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号