Open Access. Powered by Scholars. Published by Universities.®

Criminology and Criminal Justice Commons

Open Access. Powered by Scholars. Published by Universities.®

Georgia State University

Computer Sciences

MAC misbehavior

Articles 1 - 1 of 1

Full-Text Articles in Criminology and Criminal Justice

Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah Mar 2020

Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah

EBCS Articles

The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for …