Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks 2005
DOI: 10.1145/1102219.1102234
|View full text |Cite
|
Sign up to set email alerts
|

Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols

Abstract: A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energyefficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help prevent the jammer from taking actions based on the content of the packets, but the temporal arrangement of the packets induced by the nature of the protocol might unravel patterns that the jammer can take advantage of even when the packets are encrypted. By looking at the packet interar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
83
0
1

Year Published

2006
2006
2017
2017

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 117 publications
(87 citation statements)
references
References 32 publications
(50 reference statements)
0
83
0
1
Order By: Relevance
“…The protocol uses random access to the communication medium, which means that there are no slots or frames to send the data, but these can be added if there is a need [30]. As the sending and receiving nodes are not synchronized, the transmitter has to transmit a preamble that is long enough to be detected by the receiver which only wakes up periodically (LPL -lowpower listening).…”
Section: B B-mac (Berkeley Media Access Control For Low-power Sensormentioning
confidence: 99%
See 1 more Smart Citation
“…The protocol uses random access to the communication medium, which means that there are no slots or frames to send the data, but these can be added if there is a need [30]. As the sending and receiving nodes are not synchronized, the transmitter has to transmit a preamble that is long enough to be detected by the receiver which only wakes up periodically (LPL -lowpower listening).…”
Section: B B-mac (Berkeley Media Access Control For Low-power Sensormentioning
confidence: 99%
“…If an attacker wants to perform a jamming attack on B-MAC that uses periodic listening cycles, a preamble interval has to be determined. This is known as a statistical jamming attack based on the probability estimation of packet inter-arrival times [30]. If an adversary chooses to guess, more frequent sampling is needed which reduces the efficiency of jammer.…”
Section: B Security and Attacks In B-macmentioning
confidence: 99%
“…Due to the topic's importance, wireless network jamming has been extensively studied in the applied research fields [1, 5, 6, 22, 26-28, 30, 31, 39, 41-43], both from the attacker's perspective [6,26,27,43] as well as from the defender's perspective [1,5,6,27,28,30,41,43]-also in multi-hop settings (e.g. [21,32,[45][46][47]).…”
Section: Related Workmentioning
confidence: 99%
“…Different MAC protocols were defined for WSN because of its application dependency. MAC protocols have to compensate between providing energy efficient consumption with the availability of decent throughput to make the system dependable (Van Hoesel, Havigna, 2004;Law et al, 2005) . An essential characteristic of wireless communication is that it provides an inherently shared medium.…”
Section: Mac Protocols Effect In Wsnsmentioning
confidence: 99%