Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

Research Article

Attacking Beacon-Enabled 802.15.4 Networks

Download
588 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-16161-2_15,
        author={Sang Jung and Marco Valero and Anu Bourgeois and Raheem Beyah},
        title={Attacking Beacon-Enabled 802.15.4 Networks},
        proceedings={Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings},
        proceedings_a={SECURECOMM},
        year={2012},
        month={5},
        keywords={Insider attacks Beacon-enabled 802.15.4 wireless sensor networks MAC misbehavior},
        doi={10.1007/978-3-642-16161-2_15}
    }
    
  • Sang Jung
    Marco Valero
    Anu Bourgeois
    Raheem Beyah
    Year: 2012
    Attacking Beacon-Enabled 802.15.4 Networks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-16161-2_15
Sang Jung1,*, Marco Valero1,*, Anu Bourgeois1,*, Raheem Beyah1,*
  • 1: Georgia State University
*Contact email: sangsin@cs.gsu.edu, mvalero@cs.gsu.edu, abourgeois@cs.gsu.edu, rbeyah@cs.gsu.edu

Abstract

The IEEE 802.15.4 standard has attracted time-critical applications in wireless sensor networks (WSNs) because of its beacon-enabled mode and guaranteed time slots (GTSs). However, the GTS management scheme’s built-in security mechanisms still leave the 802.15.4 MAC vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 either focus on non beacon-enabled mode 802.15.4 or cannot defend against insider attacks for beacon-enabled mode 802.15.4. In this paper we illustrate this by demonstrating attacks on the availability and integrity of a beacon-enabled 802.15.4 sensor network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky Motes for sensor nodes, where the malicious node is deployed as an inside attacker. We show that the malicious node can easily exploit information retrieved from the beacon frames to compromise the integrity and availability of the network. We also discuss possible defense mechanisms against these attacks.