A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help prevent the jammer from taking actions based on the content of the packets, but the temporal arrangement of the packets induced by the nature of the protocol might unravel patterns that the jammer can take advantage of even when the packets are encrypted. By looking at the packet interarrival times in three representative MAC protocols, S-MAC, LMAC and B-MAC, we derive several jamming attacks that allow the jammer to jam S-MAC, LMAC and B-MAC energy-efficiently. The jamming attacks are based on realistic assumptions....
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
Abstract — Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks...
A typical wireless sensor node has little protection against radio jamming. The situation becomes wo...
A typical wireless sensor node has little protection against radio jamming. The situation becomes wo...
A typical wireless sensor node has little protection against radio jamming. The situation becomes wo...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
Abstract — Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks...
A typical wireless sensor node has little protection against radio jamming. The situation becomes wo...
A typical wireless sensor node has little protection against radio jamming. The situation becomes wo...
A typical wireless sensor node has little protection against radio jamming. The situation becomes wo...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option ...
Abstract — Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks...