2014 Conference on Information Assurance and Cyber Security (CIACS) 2014
DOI: 10.1109/ciacs.2014.6861324
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 10 publications
0
15
0
Order By: Relevance
“…This layer includes different types of communication protocols such as Ethernet, IEEE802 families Programmable logic controller (PLC), Wireless Sensor Network (WSN), Global Positioning System (GPS), Near-Field Communication (NFC), Wireless-Highway Addressable Remote Transducer Protocol (Wireless-HART), Radio-Frequency Identification (RFID) Long Range Protocol (LoRa), Integrated Services Digital Network (ISDN), Bluetooth, Enterprise Service BUS (ESB), Integrated Development Environment (IDE), Digital Subscriber Line (DSL) etc. [82], [83], [84], [85]. A communication protocol can be chosen for a node based on the Quality of Service (QoS) demand.…”
Section: A Iot Model A: Perception Layermentioning
confidence: 99%
“…This layer includes different types of communication protocols such as Ethernet, IEEE802 families Programmable logic controller (PLC), Wireless Sensor Network (WSN), Global Positioning System (GPS), Near-Field Communication (NFC), Wireless-Highway Addressable Remote Transducer Protocol (Wireless-HART), Radio-Frequency Identification (RFID) Long Range Protocol (LoRa), Integrated Services Digital Network (ISDN), Bluetooth, Enterprise Service BUS (ESB), Integrated Development Environment (IDE), Digital Subscriber Line (DSL) etc. [82], [83], [84], [85]. A communication protocol can be chosen for a node based on the Quality of Service (QoS) demand.…”
Section: A Iot Model A: Perception Layermentioning
confidence: 99%
“…In order to execute a DoS attack at the MAC layer, the attacker (who can be a common external user) tries, by means of certain types of messages such as acknowledgement messages, to create collisions that interfere with legitimate communications [138]. Media access protocols such as slot allocation are particularly vulnerable to these attacks [139], the main aim of which is to interrupt any communication, which in turn impacts network availability. Exhaustion attacks are oriented toward the MAC layer too, taking advantage of the limited resources (energy, memory, processing) of the equipment.…”
Section: Mac Layer Attacksmentioning
confidence: 99%
“…Hummen et al [ 33 ] proposed two complementary and lightweight defense mechanisms to counter fragmentation attack in the adaptation layer of 6LoWPAN. The security capability of IEEE 802.15.4 MAC protocol as well as the limitations thereof in the context of IoT are analyzed in [ 34 ]. A security threat analysis of RPL has been performed in [ 11 ], where potential security issues and fundamental countermeasures are presented.…”
Section: Related Workmentioning
confidence: 99%