作者
Yee Wei Law, Marimuthu Palaniswami, Lodewijk Van Hoesel, Jeroen Doumen, Pieter Hartel, Paul Havinga
发表日期
2009/2/11
期刊
ACM Transactions on Sensor Networks (TOSN)
卷号
5
期号
1
页码范围
1-38
出版商
ACM
简介
A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help to prevent the jammer from taking actions based on the content of the packets, but the temporal arrangement of the packets induced by the nature of the protocol might unravel patterns that the jammer can take advantage of, even when the packets are encrypted.
By looking at the packet interarrival times in three representative MAC protocols, S-MAC, LMAC, and B-MAC, we derive several jamming attacks that allow the jammer to jam S-MAC, LMAC, and B-MAC energy efficiently. The jamming attacks are based on realistic assumptions. The algorithms are described in detail and simulated. The effectiveness and efficiency of the attacks are examined. In addition, we validate our simulation …
引用总数
200820092010201120122013201420152016201720182019202020212022202320242024433333343024232026171214863
学术搜索中的文章
YW Law, M Palaniswami, LV Hoesel, J Doumen… - ACM Transactions on Sensor Networks (TOSN), 2009