2014
DOI: 10.1007/s11276-014-0855-2
|View full text |Cite
|
Sign up to set email alerts
|

Attacking and securing beacon-enabled 802.15.4 networks

Abstract: The IEEE 802.15.4 has attracted time-critical applications in wireless sensor networks (WSNs) because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS scheme's security still leave the 802.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…• Track the first packet P 2 after P 1 which satisfies the following conditions (assuming non zero inactive portion): -The packet following P 2 should not be a packet with length 5 on the MAC layer (acknowledgment packet) within "macAcknowledgementWaitDuration" duration. 3 Interarrival time for beacon frame = (inactive duration + time left in the active duration of the preceeding beacon interval after the starting time of the last packet) 4 we consider only networks which utilize acknowledgement packet. However, the proposed algorithm can be extended with minor modifications to acknowledgement free networks.…”
Section: B Algorithm For Tracking Beacon Intervalmentioning
confidence: 99%
See 1 more Smart Citation
“…• Track the first packet P 2 after P 1 which satisfies the following conditions (assuming non zero inactive portion): -The packet following P 2 should not be a packet with length 5 on the MAC layer (acknowledgment packet) within "macAcknowledgementWaitDuration" duration. 3 Interarrival time for beacon frame = (inactive duration + time left in the active duration of the preceeding beacon interval after the starting time of the last packet) 4 we consider only networks which utilize acknowledgement packet. However, the proposed algorithm can be extended with minor modifications to acknowledgement free networks.…”
Section: B Algorithm For Tracking Beacon Intervalmentioning
confidence: 99%
“…They provide several jamming techniques that allow the jammer to jam the networks using these MAC protocols in an energy efficient manner. In [4] and [5] insider attacks on beacon enabled networks, in particular on the management of GTS are given. In [6] various attacks on different layers of WSNs are given.…”
Section: Introductionmentioning
confidence: 99%