
Research Article
A Solution Against Selective Jamming Attack in IEEE 802.15.4e Wireless Networks
@INPROCEEDINGS{10.1007/978-3-031-80713-8_19, author={Xinlong Wang and Wei Yang and Chengqi Hou}, title={A Solution Against Selective Jamming Attack in IEEE 802.15.4e Wireless Networks}, proceedings={Data Information in Online Environments. 4th EAI International Conference, DIONE 2023, Nanchang, China, November 25--27, 2023, Proceedings}, proceedings_a={DIONE}, year={2025}, month={2}, keywords={TSCH Selective jamming attack Channel selection}, doi={10.1007/978-3-031-80713-8_19} }
- Xinlong Wang
Wei Yang
Chengqi Hou
Year: 2025
A Solution Against Selective Jamming Attack in IEEE 802.15.4e Wireless Networks
DIONE
Springer
DOI: 10.1007/978-3-031-80713-8_19
Abstract
Industrial wireless technology plays a crucial role in the application of the Internet of Things (IoT). Among them, in the context of increasingly complex network topologies and the issue of control node energy consumption, the IEEE 802.15.4e protocol is a standard protocol for industrial wireless networks. The protocol incorporates Time Slotted Channel Hopping (TSCH) technology, which is widely adopted in the industrial wireless network domain due to its low latency and high reliability characteristics. However, the IEEE 802.15.4e protocol does not specify a link scheduling algorithm, leaving TSCH networks vulnerable to intelligent jamming attacks. In this paper, we explore the impact of intelligent jamming attacks on TSCH networks and emphasize the harmful consequences of this type of attack. Subsequently, a channel selection scheme for user nodes at the MAC layer of TSCH networks is proposed. Leveraging the background of game theory, the problem of link channel selection is modeled as a Stackelberg game, and a method based on stochastic selection theory is utilized to derive the game solution through the continuously updated probability matrix. Results, considering both system jamming calculations and node transmission rates, demonstrate the high effectiveness and sufficient reliability of the proposed scheme in mitigating selective intelligent jamming attacks.