首页> 外文OA文献 >Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols
【2h】

Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols

机译:针对无线传感器网络MAC协议的高能效链路层干扰攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help to prevent the jammer from taking actions based on the content of the packets, but the temporal arrangement of the packets induced by the nature of the protocol might unravel patterns that the jammer can take advantage of, even when the packets are encrypted. By looking at the packet interarrival times in three representative MAC protocols, S-MAC, LMAC, and B-MAC, we derive several jamming attacks that allow the jammer to jam S-MAC, LMAC, and B-MAC energy efficiently. The jamming attacks are based on realistic assumptions. The algorithms are described in detail and simulated. The effectiveness and efficiency of the attacks are examined. In addition, we validate our simulation model by comparing its results with measurements obtained from actual implementation on our sensor node prototypes. We show that it takes little effort to implement such effective jammers, making them a realistic threat. Careful analysis of other protocols belonging to the respective categories of S-MAC, LMAC, and B-MAC reveals that those protocols are, to some extent, also susceptible to our attacks. The result of this investigation provides new insights into the security considerations of MAC protocols.
机译:典型的无线传感器节点几乎无法防止无线电干扰。如果可以通过利用数据链路层的知识来实现​​高能效的干扰,情况将变得更糟。对数据包进行加密可以帮助防止干扰程序根据数据包的内容采取措施,但是由协议的性质引起的数据包的时间安排可能会弄乱干扰程序可以利用的模式,即使数据包是加密。通过查看三种代表性MAC协议S-MAC,LMAC和B-MAC中的数据包到达时间,我们得出了几种干扰攻击,这些干扰使干扰器能够有效地干扰S-MAC,LMAC和B-MAC能量。干扰攻击基于现实的假设。对算法进行了详细描述和仿真。检查了攻击的有效性和效率。此外,我们通过将仿真结果与实际在传感器节点原型上获得的测量结果进行比较来验证仿真模型。我们表明,实施这种有效的干扰器几乎不需要花力气,这使它们成为现实威胁。仔细分析属于S-MAC,LMAC和B-MAC各自类别的其他协议,可以发现这些协议在某种程度上也容易受到我们的攻击。调查的结果为MAC协议的安全性考虑提供了新的见解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号