scholarly journals Potential Security Vulnerabilities of the IEEE 802.15.4 Standard and a Proposed Solution Against the Dissociation Process

Author(s):  
ABDULLAH ALABDULATIF

Many different networks that rely on short-distance wireless technology for their functions utilize the IEEE 802.15.4 Standard, especially in the case of systems that experience a low level of traffic. The networks using this standard are typically based on the Low-Rate Wireless Personal Area Network, herein called the LR-WPAN; this network is used for the provision of both the physical layer, herein referred to as the PHY, and the media access control, herein abbreviated as the MAC. There are four security features in the IEEE 802.15.4 Standard that are designed to ensure the safe and secure transmission of data through the network. Disconnection from the network is managed and controlled by the message authentication code, herein referred to as the MAC, while the coordinator personal area network, herein abbreviated as the PAN, is also able to trigger the disconnection. However, the process of disconnection from the network is one area of vulnerability to denial-of-service attacks, herein referred to as DoS; this highlights a major shortcoming of the IEEE 802.15.4 Standard’s security features. This paper is intended to contribute to the improvement of security for the IEEE network by conducting a specific and in-depth review of available literature as well as conducting an analysis of the disassociation process. In doing so, potential new threats will be highlighted, and this data can be used to improve the security of the IEEE 802.15.4 Standard. Overall, in this paper, the role of the Castalia tool in the OMNET++ environment is analysed and interpreted for these potential new threats. Also, this paper proposes a solution to such threats to improve the security IEEE 802.15.4 disassociation process. Keywords: Disassociation vulnerability of IEEE 802.15.4 Standard, DoS attack, IoT security.

2014 ◽  
Vol 2014 ◽  
pp. 1-13
Author(s):  
Mukhtar Azeem ◽  
Majid I. Khan ◽  
Yasir Faheem ◽  
Manzoor Illahi Tamimy ◽  
Najmus Saqib Malik ◽  
...  

Wireless sensor networks (WSNs) find applications in the industrial automation where periodic and sporadic events occur. The combined propagation of information generated by periodic and sporadic events from a sensor node to an actuator node is challenging due to random nature of sporadic events, particularly, if the deadlines are hard. The IEEE 802.15.4 standard provides the basis for a real-time communication mechanism between neighboring nodes of the WSN at the media access control layer. However, the standard does not address such communications over multiple hops. To support the industrial applications with such requirements, this work proposes a novel online control protocol that exploits the basis provided by the IEEE 802.15.4 standard. The proposed control protocol ensures that a given offline sporadic schedule can be adapted online in a timely manner such that the static periodic schedule has not been disturbed and the IEEE 802.15.4 standard compliance remains intact. The proposed protocol is simulated in OPNET. The simulation results are analyzed and presented in this paper to prove the correctness of the proposed protocol regarding the efficient real-time sporadic event delivery along with the periodic event propagation.


Author(s):  
Zakha Maisat Eka Darmawan ◽  
M. Udin Harun Al Rasyid ◽  
Amang Sudarsono

IEEE 802.15.4 standard is widely used in wireless personal area networks (WPANs). The devices transmit data during two periods: contention access period (CAP) by accessing the channel using CSMA/CA and contention free period (CFP), which consists of guaranteed time slots (GTS) allocated to individual devices by the personal area network (PAN). However, the use of GTS slot size may lead to severe bandwidth wastage if  the traffic pattern is not fit or only a small portion of GTS slot is used by allocated device. The proposed scheme devides the GTS slot and then optimizes the GTS slot size by exploiting the value of superframe order (SO) information. The proposed scheme was tested through simulations and the results show that the new GTS allocation scheme perform better than the original IEEE 802.15.4 standard in terms of average transmitted packets, throughput, latency and probability of successful packets.


2018 ◽  
Author(s):  
Kiramat

IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communications. Maintained by the Institute of Electrical and Electronics Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802). This document highlights the main features of IEEE 802.11n variant such as MIMO, frame aggregation and beamforming along with the problems in this variant and their solutions


2013 ◽  
Vol 2013 ◽  
pp. 1-9 ◽  
Author(s):  
Tsung-Han Lee ◽  
Hung-Chi Chu ◽  
Lin-Huang Chang ◽  
Hung-Shiou Chiang ◽  
Yen-Wen Lin

6LoWPAN technology has attracted extensive attention recently. It is because 6LoWPAN is one of Internet of Things standard and it adapts to IPv6 protocol stack over low-rate wireless personal area network, such as IEEE 802.15.4. One view is that IP architecture is not suitable for low-rate wireless personal area network. It is a challenge to implement the IPv6 protocol stack into IEEE 802.15.4 devices due to that the size of IPv6 packet is much larger than the maximum packet size of IEEE 802.15.4 in data link layer. In order to solve this problem, 6LoWPAN provides header compression to reduce the transmission overhead for IP packets. In addition, two selected routing schemes, mesh-under and route-over routing schemes, are also proposed in 6LoWPAN to forward IP fragmentations under IEEE 802.15.4 radio link. The distinction is based on which layer of the 6LoWPAN protocol stack is in charge of routing decisions. In route-over routing scheme, the routing distinction is taken at the network layer and, in mesh-under, is taken by the adaptation layer. Thus, the goal of this research is to understand the performance of two routing schemes in 6LoWPAN under error-prone channel condition.


Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2433 ◽  
Author(s):  
Litao Han ◽  
Li Jiang ◽  
Qiaoli Kong ◽  
Ji Wang ◽  
Aiguo Zhang ◽  
...  

For existing wireless network devices and smart phones to achieve available positioning accuracy easily, fingerprint localization is widely used in indoor positioning, which depends on the differences of the Received Signal Strength Indicator (RSSI) from the Wireless Local Area Network (WLAN) in different places. Currently, most researchers pay more attention to the improvement of online positioning algorithms using RSSI values, while few focus on the MAC (media access control) addresses received from the WLAN. Accordingly, we attempt to integrate MAC addresses and RSSI values simultaneously in order to realize indoor localization within multi-story buildings. A novel approach to indoor positioning within multi-story buildings is presented in this article, which includes two steps: firstly, to identify the floor using the difference of received MAC addresses in different floors; secondly, to implement further localization on the same floor. Meanwhile, clustering operation using MAC addresses as the clustering index is introduced in the online positioning phase to improve the efficiency and accuracy of indoor positioning. Experimental results show that the proposed approach can achieve not only the precise location with the horizontal accuracy of 1.8 meters, but also the floor where the receiver is located within multi-story buildings.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Lurong Jiang ◽  
Qiaoyu Xu ◽  
Hangyi Pan ◽  
Yanyun Dai ◽  
Jijun Tong

In wireless sensor networks, network security against virus propagation is one of the challenges with the applications. In severe cases, the network system may become paralyzed. In order to study the process of virus propagation in wireless sensor networks with the media access control mechanism, this paper uses the susceptible-infectious-removed (SIR) model to analyze the spreading process. It provides a theoretical basis for the development of virus immune mechanisms to solve network virus attack hidden dangers. The research shows that the media access control (MAC) mechanism in the wireless sensor network can inhibit the process of virus propagation, reduce the network virus propagating speed, and decrease the scale of infected nodes. The listen/sleep duty cycle of this mechanism will affect the suppression effect of virus propagation. The smaller the listen/sleep duty cycle, the stronger the suppression effect. Energy consumption has a peak value under specific infection probability. Meanwhile, it is also found that the spreading scale of the virus in wireless sensor networks can be effectively inhibited by the MAC mechanism.


2020 ◽  
Author(s):  
Noah J. Goodall

Many transportation agencies use re-identification technologies to identify vehicles at multiple points along the roadway as a way to measure travel times and congestion. Examples of these technologies include license plate readers, toll tag transponders, and media access control (MAC) address scanners for Bluetooth devices. Recent advancements have allowed for the detection of unique MAC addresses from Wi-Fi and wireless local area network (WLAN) enabled devices. This paper represents one of the first attempts to measure the fundamental characteristics of Wi-Fi re-identification technology as it applies to transportation data collection. Wi-Fi sampling rates, re-identification rates, range, transmission success rates, and probability of discovery of sensors and mobile devices were measured, and a model of probability of detection is presented. Field tests found that mobile phones routinely experienced significant time gaps between Wi-Fi transmissions. The study recommends that Wi-Fi sensors be deployed at low-volume, low-speed roadways, with sensors positioned near intersections where vehicles are likely to slow or stop. Due to Wi-Fi’s relatively low probability of discovery, the technology may produce poor results in applications that require re-identifying vehicles over multiple consecutive sensors.


2017 ◽  
Vol 15 ◽  
pp. 107-113 ◽  
Author(s):  
Josua Arndt ◽  
Lukas Krystofiak ◽  
Vahid Bonehi ◽  
Ralf Wunderlich ◽  
Stefan Heinen

Abstract. Power consumption in wireless networks is crucial. In most scenarios the transmission time is short compared to the idle listening time for data transmission, the most power is consumed by the receiver. In low latency systems there is a need for low power wake-up receivers (WuRx) that reduce the power consumption when the node is idle, but keep it responsive. This work presents a WuRx designed out of commercial components to investigate the needs of a WuRx when it is embedded in a Wireless Personal Area Network (WPAN) system in a real environment setup including WLAN and LTE communication and considering interferer rejection. The calculation necessary for the attenuation of those interferers is explained in detail. Furthermore, a system design is presented that fulfills the requirements for this environment and is build from off-the-shelf components.


Author(s):  
Md. Mohibur Rahaman ◽  
Mohammad Khairul Islam ◽  
Kazi Ashrafuzzaman ◽  
Mohammad Sanaullah Chowdhury

<p>The IEEE 802.15.4 is the standard for Low Rate Wireless Personal Area network (LR-WPAN). It is widely used in many application areas. The standard uses Slotted CSMA/CA mechanism in its contention access period (CAP) for the beacon enabled mode. The protocol has two modes - single sensing (SS) and double sensing (DS). The protocol also adopts a binary exponential backoff (BEB) algorithm. In this paper, we explore the saturation throughput, delay and energy consumption of this standard with double sensing (DS) using the existing BEB algorithm. We also investigate three other backoff schemes - exponential increase exponential decrease (EIED), exponential increase linear decrease (EILD) and exponential increase multiplicative decrease (EIMD). From simulation results, it is found that the EIED, EILD, EIMD perform better than the BEB for higher loads. It shows that the EIED, EILD, EIMD have better throughput and lower delay than the BEB. The EIED outperforms the other schemes in terms of throughput, delay and energy for the higher loads.</p>


Sign in / Sign up

Export Citation Format

Share Document