2008 Second International Conference on Sensor Technologies and Applications (Sensorcomm 2008) 2008
DOI: 10.1109/sensorcomm.2008.75
|View full text |Cite
|
Sign up to set email alerts
|

On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack

Abstract: In the last several years IEEE 802.15.4 [1]

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0
2

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(31 citation statements)
references
References 17 publications
0
29
0
2
Order By: Relevance
“…However, if attackers cause interference during this process (e.g., by jamming), then ordinary nodes cannot register themselves for the guaranteed time slots and thus QoS of the application gets affected. This attack is called GTS attack [51].…”
Section: D/dos Attacks To the Physical Layermentioning
confidence: 99%
“…However, if attackers cause interference during this process (e.g., by jamming), then ordinary nodes cannot register themselves for the guaranteed time slots and thus QoS of the application gets affected. This attack is called GTS attack [51].…”
Section: D/dos Attacks To the Physical Layermentioning
confidence: 99%
“…At that time, the ZigBee family of protocols were solely layered on the IEEE 802.15.4 MAC layer standard. Some research, targeted solely at the 802.15.4 MAC layer, identified security concerns (see Sokullu, 2008;O'Flynn, 2011). Exploitation of these security issues could bring the link to the network down but would not provide access to application layer packet contents.…”
Section: Han Architecturementioning
confidence: 99%
“…In [25], R. Sokullu et al use ns-2 simulations to demonstrate GTS attacks on the 802.15.4 MAC, particularly in beacon-enabled mode. The GTS attacks were divided into four different scenarios: One Intelligent Attacker (OIA), One Random Attacker (ORA), Two Intelligent Attackers (TIAs), and Two Random Attackers (TRAs).…”
Section: Attacks On Beacon-enabled 802154 Networkmentioning
confidence: 99%
“…In contrast, the ORA and TRAs scenarios attack just one randomly chosen GTS. The main goal of the GTS attacks in [25] is to create collisions during the CFP to deny the use of GTSs.…”
Section: Attacks On Beacon-enabled 802154 Networkmentioning
confidence: 99%
See 1 more Smart Citation