On the IEEE 802.15. 4 MAC layer attacks: GTS attack

R Sokullu, O Dagdeviren… - 2008 Second international …, 2008 - ieeexplore.ieee.org
In the last several years IEEE 802.15. 4 has been accepted as a major MAC layer protocol
for wireless sensor networks (WSNs) and has attracted the interest of there search …

An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks

M López, A Peinado, A Ortiz - Computer Networks, 2019 - Elsevier
This paper describes the utilization of an epidemic approach to study the propagation of
jamming attacks, which can affect to different communication layers of all nodes in a variety …

A comprehensive taxonomy and analysis of IEEE 802.15. 4 attacks

YM Amin, AT Abdel-Hamid - Journal of Electrical and Computer …, 2016 - Wiley Online Library
The IEEE 802.15. 4 standard has been established as the dominant enabling technology for
Wireless Sensor Networks (WSNs). With the proliferation of security‐sensitive applications …

Classification and analysis of security attacks in WSNs and IEEE 802.15. 4 standards: A survey

M Sharma, A Tandon, S Narayan… - 2017 3rd International …, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are an emerging technology due to its huge number of
applications such as military investigations and civilian scenarios. Once deployed, these …

Security analysis of IEEE 802.15. 4 MAC in the context of Internet of Things (IoT)

SM Sajjad, M Yousaf - 2014 Conference on Information …, 2014 - ieeexplore.ieee.org
A paradigm in which household substances around us with embedded computational
competences and capable of producing and distributing information is referred to as Internet …

Thwarting attacks on ZigBee-Removal of the KillerBee stinger

B Stelte, GD Rodosek - … of the 9th international conference on …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) have recently emerged as an important research topic.
Due to the enormous number of sensor nodes and the constrained resources, specific …

ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys

P Radmand, M Domingo, J Singh… - … Conference on P2P …, 2010 - ieeexplore.ieee.org
Sensor networks have many applications in monitoring and controlling of environmental
properties such as sound, acceleration, vibration and temperature. Due to limited resources …

Security vulnerabilities and risks in industrial usage of wireless communication

S Plósz, A Farshad, M Tauber, C Lesjak… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Due to its availability and low cost, the use of wireless communication technologies
increases in domains beyond the originally intended usage areas, eg M2M communication …

Jamsense: interference and jamming classification for low-power wireless networks

J Kanwar, N Finne, N Tsiftes, J Eriksson… - 2021 13th IFIP …, 2021 - ieeexplore.ieee.org
Low-power wireless networks transmit at low output power and are hence susceptible to
cross-technology interference. The latter may cause packet loss which may waste scarce …

Practical security overview of IEEE 802.15. 4

A Reziouk, E Laurent, JC Demay - … International Conference on …, 2016 - ieeexplore.ieee.org
IEEE 802.15. 4 is a wireless standard that specifies physical layer and media access control
while focusing on low-cost and low-power transmissions between devices, making it a …