scholarly journals Identifying Misbehaving Greedy Nodes in IoT Networks

Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5127
Author(s):  
Fatima Salma Sadek ◽  
Khaled Belkadi ◽  
Abdelhafid Abouaissa ◽  
Pascal Lorenz

One of the central communication infrastructures of the Internet of Things (IoT) is the IEEE 802.15.4 standard, which defines Low Rate Wireless Personal Area Networks (LR- WPAN). In order to share the medium fairly in a non-beacon-enabled mode, the standard uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). The nature of connected objects with respect to various resource constraints makes them vulnerable to cyber attacks. One of the most aggressive DoS attacks is the greedy behaviour attack which aims to deprive legitimate nodes to access to the communication medium. The greedy or selfish node may violate the proper use of the CSMA/CA protocol, by tampering its parameters, in order to take as much bandwidth as possible on the network, and then monopolize access to the medium by depriving legitimate nodes of communication. Based on the analysis of the difference between parameters of greedy and legitimate nodes, we propose a method based on the threshold mechanism to identify greedy nodes. The simulation results show that the proposed mechanism provides a detection efficiency of 99.5%.

2018 ◽  
Vol 11 (1) ◽  
pp. 78 ◽  
Author(s):  
Yasmin M. Amin ◽  
Amr T. Abdel-Hamid

The IEEE 802.15.4 standard defines the PHY and MAC layer specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). With the proliferation of many time-critical applications with real-time delivery, low latency, and/or specific bandwidth requirements, Guaranteed Time Slots (GTS) are increasingly being used for reliable contention-free data transmission by nodes within beacon-enabled WPANs. To evaluate the performance of the 802.15.4 GTS management scheme, this paper introduces a new GTS simulation model for OMNeT++ / MiXiM. Our GTS model considers star-topology WPANs within the 2.4 GHz frequency band, and is in full conformance with the IEEE 802.15.4 – 2006 standard. To enable thorough investigation of the behaviors and impacts of different attacks against the 802.15.4 GTS mechanism, a new GTS attacks simulation model for OMNeT++ is also introduced in this paper. Our GTS attacks model is developed for OMNeT++ / NETA, and is integrated with our GTS model to provide a single inclusive OMNeT++ simulation model for both the GTS mechanism and all known-to-date attacks against it.


The IEEE 802.15.4 standard provides mainly accessing, monitoring, and controlling capability of the Wireless devices. This standard supports short-range wireless communications and Low Rate (LR) - Wireless Personal Area Networks (WPANs). This manuscript presents the fully integrated digital 802.15.4 Transceiver, which suitable to ZigBee Device Standard at 2.4GHz range. The 802.15.4 Transceiver design includes an 8-bit input data sequence mapped to lower and Upper Symbols followed by Chip-sequence conversion as per the IEEE standard. The chip sequences are mapped separately as even and odd sequences used for the Offset-QPSK Modulation. The chip synchronization achieved by using a proper clocking mechanism on the receiver side. The 802.15.4 Transceiver design is implemented on Artix-7 FPGA using Xilinx Environment. The hardware constraints like Area (Slices), Frequency, and Power are analyzed. The proposed work also compared with existing similar approaches with more significant improvements in chip area and Power.


2013 ◽  
Vol 10 (9) ◽  
pp. 1963-1968
Author(s):  
Samundiswary P. ◽  
Surender R

IEEE 802.15.4 standard based wireless sensor networks (WSNs) emerges as the next generation wireless standard for low-rate wireless personal area networks. IEEE 802.15.4 standard offers low power, low data rate and short range networking for wireless battery powered devices. It has also started to demand much attention towards research. The performance of the network can be analysed by using different types of routing protocols. In this paper, the performance analysis of IEEE 802.15.4 based Wireless Sensor Networks is done by using  Location Aided Routing (LAR) protocols for the traffic applications such as Constant Bit Rate (CBR) and Zigbee traffic application. The LAR protocol enables the routing of data between the source and destination by using directional flooding technique. The performance metrics such as throughput, delay, jitter and packets dropped of LAR for  CBR and Zigbee traffic application is evaluated and analysed. The simulation is modelled by using QualNet.


Author(s):  
Zakha Maisat Eka Darmawan ◽  
M. Udin Harun Al Rasyid ◽  
Amang Sudarsono

IEEE 802.15.4 standard is widely used in wireless personal area networks (WPANs). The devices transmit data during two periods: contention access period (CAP) by accessing the channel using CSMA/CA and contention free period (CFP), which consists of guaranteed time slots (GTS) allocated to individual devices by the personal area network (PAN). However, the use of GTS slot size may lead to severe bandwidth wastage if  the traffic pattern is not fit or only a small portion of GTS slot is used by allocated device. The proposed scheme devides the GTS slot and then optimizes the GTS slot size by exploiting the value of superframe order (SO) information. The proposed scheme was tested through simulations and the results show that the new GTS allocation scheme perform better than the original IEEE 802.15.4 standard in terms of average transmitted packets, throughput, latency and probability of successful packets.


2015 ◽  
Vol 4 (1) ◽  
Author(s):  
Nurhayati, Muhammad Hasrul Ma’ruf

Nowadays, Technology is growing rapidly, the one of example of technology, helps the human being to fulfill theirneed of information. The development of information technology and communication make the data  faster and also make the updating data easier for example protocols. The used of information and communication technology that is simple, automatic, low rate data and the lasting power has become imperative in accordance  with technological developments. In the field of wireless networking technology networks currently well addressed for this include Zigbeeprotocol. The technology in the specified ZigBee aimed at them. ZigBee is a specification for high-level communicationprotocol package that uses a small amount of low-power digital radios based on, the IEEE 802.15.4 standard for wireless personal area networks (WPANs). In this paper we discuss further on what and how Zigbee  is, how the relationship the IEEE and Zigbee are, who uses of Zigbee, how history of Zigbee is. What the hardware and softwareon Zigbee are, how it work as well as the type of Zigbee does. What the types of applications that use Zegbee are andhow usability Zigbe in general and home applications is. Keywords: Wireless Personal Area networks (WPAN)s, IEEE, Zigbee.


2012 ◽  
Vol 2012 ◽  
pp. 1-10 ◽  
Author(s):  
Vinay Kumar ◽  
Sudarshan Tiwari

6LoWPANs (IPv6-based Low-Power Personal Area Networks) are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP) does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6) and data link layer (IEEE802.15.4 MAC) to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.


2021 ◽  
Author(s):  
Vida Azimi

Machine-to-Machine communication (M2M) refers to automated applications executing on smart devices or machines that communicate through a network with little or no human intervention at all. By enabling smart devices to communicate directly with one another, M2M communications technology has the potential to radically change the world around us and the way that we interact with objects. Many applications can benefit from M2M communications, such as transportation, health care, smart energy production, transmission, and distribution, logistics, city automation and manufacturing, security and safety, and others. This work describes an approach to implement M2M communications using the well-known IEEE 802.15.4 / ZigBee communications standard for low data rate wireless personal area networks. In order to achieve better performance for M2M traffic, we propose some improvements in the protocol. Our simulation results confirm the validity


2009 ◽  
pp. 1037-1043
Author(s):  
João Henrique Kleinschmidt ◽  
Walter Cunha Borelli

Bluetooth (Bluetooth SIG, 2004) and ZigBee (ZigBee Alliance, 2004) are short-range radio technologies designed for wireless personal area networks (WPANs), where the devices must have low power consumption and require little infrastructure to operate, or none at all. These devices will enable many applications of mobile and pervasive computing. Bluetooth is the IEEE 802.15.1 (2002) standard and focuses on cable replacement for consumer devices and voice applications for medium data rate networks. ZigBee is the IEEE 802.15.4 (2003) standard for low data rate networks for sensors and control devices. The IEEE defines only the physical (PHY) and medium access control (MAC) layers of the standards (Baker, 2005). Both standards have alliances formed by different companies that develop the specifications for the other layers, such as network, link, security, and application. Although designed for different applications, there exists some overlap among these technologies, which are both competitive and complementary. This article makes a comparison of the two standards, addressing the differences, similarities, and coexistence issues. Some research challenges are described, such as quality of service, security, energy-saving methods and protocols for network formation, routing, and scheduling.


Sign in / Sign up

Export Citation Format

Share Document