메뉴 건너뛰기




Volumn 5, Issue 1, 2009, Pages

Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols

Author keywords

Clustering; Denial of service attacks; Expectation maximization; Jamming; MAC protocols

Indexed keywords

CLUSTERING; DATA LINK LAYERS; DENIAL-OF-SERVICE ATTACKS; ENERGY-EFFICIENT; EXPECTATION MAXIMIZATION; INTER-ARRIVAL TIME; JAMMERS; MAC PROTOCOLS; RADIO JAMMING; SECURITY CONSIDERATIONS; SIMULATION MODELS; WIRELESS SENSOR NODES; WIRELESS SENSORS;

EID: 60449113417     PISSN: 15504859     EISSN: 15504867     Source Type: Journal    
DOI: 10.1145/1464420.1464426     Document Type: Article
Times cited : (137)

References (70)
  • 2
    • 5444275208 scopus 로고    scopus 로고
    • Wireless sensor and actor networks: Research challenges
    • AKYILDIZ, I. AND KASIMOGLU, I. 2004. Wireless sensor and actor networks: Research challenges. Elsevier Ad Hoc Netw. 2, 4, 351-367.
    • (2004) Elsevier Ad Hoc Netw , vol.2 , Issue.4 , pp. 351-367
    • AKYILDIZ, I.1    KASIMOGLU, I.2
  • 5
    • 17744380057 scopus 로고
    • Coin flipping by telephone a protocol for solving impossible problems
    • BLUM, M. 1983. Coin flipping by telephone a protocol for solving impossible problems. SIGACT News 15, 1, 23-27.
    • (1983) SIGACT News
    • BLUM, M.1
  • 8
    • 0002629270 scopus 로고
    • Maximum likelihood from incomplete data via the EM algorithm
    • DEMPSTER, A. P., LAIRD, N. M., AND RUBIN, D. B. 1977. Maximum likelihood from incomplete data via the EM algorithm. J. Royal Stat. Soci., Series B 39, 1, 1-38.
    • (1977) J. Royal Stat. Soci., Series B , vol.39 , Issue.1 , pp. 1-38
    • DEMPSTER, A.P.1    LAIRD, N.M.2    RUBIN, D.B.3
  • 9
    • 32644437991 scopus 로고    scopus 로고
    • DENG, J., HAN, R., AND MISHRA, S. 2006. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Elsevier Pervasive Mobile Comput. J., Special Issue on Security in Wireless Mobile Computing Systems 2, 2, 159-186.
    • DENG, J., HAN, R., AND MISHRA, S. 2006. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Elsevier Pervasive Mobile Comput. J., Special Issue on Security in Wireless Mobile Computing Systems 2, 2, 159-186.
  • 10
    • 33745933037 scopus 로고    scopus 로고
    • Aloha with preamble sampling for sporadic traffic in ad hoc wireless sensor networks
    • IEEE Press
    • EL-HOIYDI, A. 2000. Aloha with preamble sampling for sporadic traffic in ad hoc wireless sensor networks. In IEEE International Conference on Communications. IEEE Press.
    • (2000) IEEE International Conference on Communications
    • EL-HOIYDI, A.1
  • 13
    • 0036870095 scopus 로고    scopus 로고
    • Mica: A wireless platform for deeply embedded networks
    • HILL, J. AND CULLER, D. 2002. Mica: A wireless platform for deeply embedded networks. IEEE Micro 22, 6, 12-24.
    • (2002) IEEE Micro , vol.22 , Issue.6 , pp. 12-24
    • HILL, J.1    CULLER, D.2
  • 15
    • 4344650787 scopus 로고    scopus 로고
    • Sift: A MAC protocol for event-driven wireless sensor networks
    • Tech. rep. MIT-LCS-TR-894, Massachusetts Institute of Technology
    • JAMIESON, K., BALAKRISHNAN, H., AND TAY, Y. 2003. Sift: A MAC protocol for event-driven wireless sensor networks. Tech. rep. MIT-LCS-TR-894, Massachusetts Institute of Technology.
    • (2003)
    • JAMIESON, K.1    BALAKRISHNAN, H.2    TAY, Y.3
  • 18
    • 84948142128 scopus 로고    scopus 로고
    • Multiple access in ad-hoc wireless LANs with noncooperative stations
    • Proceedings of the 2nd International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications Networking'02, Springer
    • KONORSKL, J. 2002. Multiple access in ad-hoc wireless LANs with noncooperative stations. In Proceedings of the 2nd International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications (Networking'02). Lecture Notes in Computer Science, vol. 2345. Springer, 1141-1146.
    • (2002) Lecture Notes in Computer Science , vol.2345 , pp. 1141-1146
    • KONORSKL, J.1
  • 21
    • 26644442306 scopus 로고    scopus 로고
    • Embedded Systems Handbook. CRC Press, Chapter Energyefficient medium access control
    • To appear
    • LANGENDOEN, K. AND HALKES, G. 2005. Embedded Systems Handbook. CRC Press, Chapter Energyefficient medium access control. To appear.
    • (2005)
    • LANGENDOEN, K.1    HALKES, G.2
  • 22
    • 33745269795 scopus 로고    scopus 로고
    • LAW, Y., DOUMEN, J., AND HARTEL, P. 2006. Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sensor Netw. 2, 1, 65-93.
    • LAW, Y., DOUMEN, J., AND HARTEL, P. 2006. Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sensor Netw. 2, 1, 65-93.
  • 23
    • 33745058163 scopus 로고    scopus 로고
    • LAW, Y., HARTEL, P., DEN HARTOG, J., AND HAVINGA, P. 2005. Link-layer jamming attacks on S-MAC In Proceedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN'05). IEEE, 217-225.
    • LAW, Y., HARTEL, P., DEN HARTOG, J., AND HAVINGA, P. 2005. Link-layer jamming attacks on S-MAC In Proceedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN'05). IEEE, 217-225.
  • 26
    • 33746822588 scopus 로고    scopus 로고
    • Low power DOS attacks in data wireless LANs and countermeasures
    • Tech. rep, Northeastern University
    • LIN, G. AND NOUBIR, G. 2002. Low power DOS attacks in data wireless LANs and countermeasures. Tech. rep., Northeastern University.
    • (2002)
    • LIN, G.1    NOUBIR, G.2
  • 30
    • 60449094690 scopus 로고    scopus 로고
    • MIN, J. 1995. Analysis and design of a frequency-hopped spread-spectrum transceiver for wireless personal communications. Ph.D. thesis, University of California, Los Angeles.
    • MIN, J. 1995. Analysis and design of a frequency-hopped spread-spectrum transceiver for wireless personal communications. Ph.D. thesis, University of California, Los Angeles.
  • 31
    • 60449098573 scopus 로고    scopus 로고
    • MYSORE, M., GOLAN, M., OSTERWEIL, E., ESTRIN, D., AND RAHIMI, M. 2003. TinyDiffusion in the extensible sensing system at the James Reserve, http://www.cens.ucla.edu/ ~nraiysore/Design/OPP.
    • MYSORE, M., GOLAN, M., OSTERWEIL, E., ESTRIN, D., AND RAHIMI, M. 2003. TinyDiffusion in the extensible sensing system at the James Reserve, http://www.cens.ucla.edu/ ~nraiysore/Design/OPP.
  • 32
    • 60449095923 scopus 로고    scopus 로고
    • NEGI, R. AND PERRIG, A. 2003. Jamming analysis of MAC protocols. Tech. memo, Carnegie Mellon.
    • NEGI, R. AND PERRIG, A. 2003. Jamming analysis of MAC protocols. Tech. memo, Carnegie Mellon.
  • 33
    • 60449098254 scopus 로고    scopus 로고
    • NORDIC SEMICONDUCTOR ASA. 2005. Single chip 433/868/915 mhz transceiver nrf905. Datasheet V1.2.
    • NORDIC SEMICONDUCTOR ASA. 2005. Single chip 433/868/915 mhz transceiver nrf905. Datasheet V1.2.
  • 34
    • 33745943760 scopus 로고    scopus 로고
    • On connectivity in ad hoc networks under jamming using directional antennas and mobility
    • Wired/Wireless Internet Communications, Springer
    • NOUBIR, G. 2004. On connectivity in ad hoc networks under jamming using directional antennas and mobility. In Wired/Wireless Internet Communications. Lecture Notes in Computer Science, vol. 2957. Springer, 186-200.
    • (2004) Lecture Notes in Computer Science , vol.2957 , pp. 186-200
    • NOUBIR, G.1
  • 35
    • 29844445404 scopus 로고    scopus 로고
    • Low-Power DoS attacks in data wireless LANs and countermeasures
    • NOUBIR, G. AND LIN, G. 2003. Low-Power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mob. Comput. Commun. Rev. 7, 3, 29-30.
    • (2003) SIGMOBILE Mob. Comput. Commun. Rev , vol.7 , Issue.3 , pp. 29-30
    • NOUBIR, G.1    LIN, G.2
  • 38
    • 60449096905 scopus 로고    scopus 로고
    • POISEL, R. A. 2 003. Modern Communications Jamming Principles and Techniques. The Artech House Information Warfare Library. Artech House.
    • POISEL, R. A. 2 003. Modern Communications Jamming Principles and Techniques. The Artech House Information Warfare Library. Artech House.
  • 45
    • 60449092190 scopus 로고    scopus 로고
    • RF MONOLITHICS, INC. 2002b. TR1001: 868.35 MHz Hybrid transceiver. Datasheet.
    • RF MONOLITHICS, INC. 2002b. TR1001: 868.35 MHz Hybrid transceiver. Datasheet.
  • 50
    • 60449102187 scopus 로고    scopus 로고
    • TEXAS INSTRUMENTS, INC. 2001. MSP430x13x, MSP430x14x Mixed signal microcontroller. Datasheet.
    • TEXAS INSTRUMENTS, INC. 2001. MSP430x13x, MSP430x14x Mixed signal microcontroller. Datasheet.
  • 52
    • 0024663339 scopus 로고
    • Fundamental limitations on repeater jamming of frequency-hopping communications
    • TORRIERI, D. J. 1989. Fundamental limitations on repeater jamming of frequency-hopping communications. IEEE J. Select. Areas Commun. 7, 4, 569-575.
    • (1989) IEEE J. Select. Areas Commun , vol.7 , Issue.4 , pp. 569-575
    • TORRIERI, D.J.1
  • 53
    • 60449093854 scopus 로고    scopus 로고
    • TOVMARK, K. 2002. Chipcon application note AN014: Frequency hopping systems (rev. 1.0). Chipcon AS.
    • TOVMARK, K. 2002. Chipcon application note AN014: Frequency hopping systems (rev. 1.0). Chipcon AS.
  • 55
    • 60449112337 scopus 로고    scopus 로고
    • Design of a low-power testbed for wireless sensor networks and verification
    • Tech. rep. TR-CTIT-03-45, Centre for Telematics and Information Technology, University of Twente, The Netherlands
    • VAN HOESEL, L., DULMAN, S., HAVINGA, P., AND KIP, H. 2003. Design of a low-power testbed for wireless sensor networks and verification. Tech. rep. TR-CTIT-03-45, Centre for Telematics and Information Technology, University of Twente, The Netherlands.
    • (2003)
    • VAN HOESEL, L.1    DULMAN, S.2    HAVINGA, P.3    KIP, H.4
  • 58
    • 33745952940 scopus 로고    scopus 로고
    • WolfPack proves strength in numbers
    • VANTRAN, K. 2003. WolfPack proves strength in numbers. DefenseLINKNews.
    • (2003) DefenseLINKNews
    • VANTRAN, K.1
  • 59
    • 14844282678 scopus 로고    scopus 로고
    • On Cheating in CSMA/CA Ad Hoc Netwcorks
    • Tech. rep. IC/2004/27, EPFL-IC
    • ČAGALJ, M., GANERIWAL, S., AAD, I., AND HUBAUX, J.-P. 2004. On Cheating in CSMA/CA Ad Hoc Netwcorks. Tech. rep. IC/2004/27, EPFL-IC
    • (2004)
    • ČAGALJ, M.1    GANERIWAL, S.2    AAD, I.3    HUBAUX, J.-P.4
  • 60
    • 33845635202 scopus 로고    scopus 로고
    • Wormhole-Based antijamming techniques in sensor networks
    • ČAGALJ, M., ČAPKUN, S., AND HUBAUX, J.-P. 2007. Wormhole-Based antijamming techniques in sensor networks. IEEE Trans. Mobile Comput. 6, 1, 110-114.
    • (2007) IEEE Trans. Mobile Comput , vol.6 , Issue.1 , pp. 110-114
    • ČAGALJ, M.1    ČAPKUN, S.2    HUBAUX, J.-P.3
  • 62
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • WOOD, A. AND STANKOVIC, J. 2002. Denial of service in sensor networks. IEEE Comput. 35, 10, 54-62.
    • (2002) IEEE Comput , vol.35 , Issue.10 , pp. 54-62
    • WOOD, A.1    STANKOVIC, J.2
  • 67
    • 4344714071 scopus 로고    scopus 로고
    • Medium access control with coordinated, adaptive sleeping for wireless sensor networks
    • YE, W., HEIDEMANN, J., AND ESTRIN, D. 2003. Medium access control with coordinated, adaptive sleeping for wireless sensor networks. IEEE/ACM Trans. Netw. 12, 3, 493-506.
    • (2003) IEEE/ACM Trans. Netw , vol.12 , Issue.3 , pp. 493-506
    • YE, W.1    HEIDEMANN, J.2    ESTRIN, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.