Investigation of Continuous Wave Jamming in an IEEE 802.15.4 Network - Publication - Bridge of Knowledge

Search

Investigation of Continuous Wave Jamming in an IEEE 802.15.4 Network

Abstract

This paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate the network’s vulnerability to jamming attacks for different jammer power levels and its positions across the scene.

Acknowledgement: This paper is a result of the SCOTT project (www.scott-project.eu) which has received funding from the Electronic Component Systems for European Leadership Joint Undertaking under grant agreement No 737422. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and Austria, Spain, Finland, Ireland, Sweden, Germany, Poland, Portugal, Netherlands, Belgium, Norway.

The document reflects only the authors' view and the Commission is not responsible for any use that may be made of the information it contains.

 

Citations

  • 2

    CrossRef

  • 0

    Web of Science

  • 4

    Scopus

Cite as

Full text

download paper
downloaded 226 times
Publication version
Submitted Version
License
Copyright

Keywords

Details

Category:
Other publications
Type:
Other publications
Title of issue:
2018 22nd International Microwave and Radar Conference (MIKON) strony 242 - 246
Publication year:
2018
DOI:
Digital Object Identifier (open in new tab) 10.23919/mikon.2018.8405189
Bibliography: test
  1. A. G. Dinker and V. Sharma, "Attacks and challenges in wireless sensor networks," in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), March 2016, pp. 3069- 3074. open in new tab
  2. P. B. Hari and S. N. Singh, "Security issues in wireless sensor networks: Current research and challenges," in 2016 International Conference on Advances in Computing, Communication, Automation (ICACCA) (Spring), April 2016, pp. 1-6. open in new tab
  3. A. A. Alsahli and H. U. Khan, "Security challenges of wireless sensors devices (motes)," in 2014 World Congress on Computer Applications and Information Systems (WCCAIS), Jan 2014, pp. 1-9. open in new tab
  4. A. M. Gamundani, "An impact review on internet of things attacks," in 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), May 2015, pp. 114-118. open in new tab
  5. A. Blilat, A. Bouayad, N. E. H. Chaoui, and M. E. Ghazi, "Wireless sensor network: Security challenges," in 2012 National Days of Network Security and Systems, April 2012, pp. 68-72. open in new tab
  6. A. Mpitziopoulos and D. Gavalas, "An effective defensive node against jamming attacks in sensor networks," Security and Communication Networks, vol. 2, no. 2, pp. 145-163, 2009. open in new tab
  7. B. Yu and L. Y. Zhang, "An improved detection method for different types of jamming attacks in wireless networks," in The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014), Nov 2014, pp. 553-558. open in new tab
  8. R. A. Poisel, Modern Communications Jamming Principles and Techniques, 2nd ed. Norwood, MA, USA: Artech House, Inc., 2011. [9] "Matlab R2016b Documentation," 2017. [Online]. open in new tab
  9. A. A. Hassan, W. E. Stark, and J. E. Hershey, "Error rate for optimal follower tone-jamming," IEEE Transactions on Communications, vol. 44, no. 5, pp. 546-548, May 1996. open in new tab
  10. F. C. M. Lau and C. K. Tse, Chaos-Based Digital Communication Systems: Operating Principles, Analysis Methods, and Performance Evaluation. Springer Publishing Company, Incorporated, 2011. open in new tab
  11. M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, "Short paper: Reactive jamming in wireless networks: How realistic is the threat?" in Proceedings of the Fourth ACM Conference on Wireless Network Security, ser. WiSec '11. New York, NY, USA: ACM, 2011, pp. 47-52. open in new tab
  12. JenNet-IP WPAN Stack User Guide.
  13. "IEEE Standard for Local and metropolitan area networks-Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)," IEEE Std. 802.15.4-2011 (Revision of IEEE Std 802.15.4-2006), pp. 1-314, Sept 2011. open in new tab
Verified by:
No verification

seen 59 times

Recommended for you

Meta Tags