Investigation of Continuous Wave Jamming in an IEEE 802.15.4 Network - Publikacja - MOST Wiedzy


Investigation of Continuous Wave Jamming in an IEEE 802.15.4 Network


This paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate the network’s vulnerability to jamming attacks for different jammer power levels and its positions across the scene.

Acknowledgement: This paper is a result of the SCOTT project ( which has received funding from the Electronic Component Systems for European Leadership Joint Undertaking under grant agreement No 737422. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and Austria, Spain, Finland, Ireland, Sweden, Germany, Poland, Portugal, Netherlands, Belgium, Norway.

The document reflects only the authors' view and the Commission is not responsible for any use that may be made of the information it contains.



  • 0


  • 0

    Web of Science

  • 0


Informacje szczegółowe

Inna publikacyjna praca zbiorowa (w tym materiały konferencyjne)
Inna publikacyjna praca zbiorowa (w tym materiały konferencyjne)
Tytuł wydania:
2018 22nd International Microwave and Radar Conference (MIKON) strony 242 - 246
Rok wydania:
Cyfrowy identyfikator dokumentu elektronicznego (otwiera się w nowej karcie) 10.23919/mikon.2018.8405189
Bibliografia: test
  1. A. G. Dinker and V. Sharma, "Attacks and challenges in wireless sensor networks," in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), March 2016, pp. 3069- 3074. otwiera się w nowej karcie
  2. P. B. Hari and S. N. Singh, "Security issues in wireless sensor networks: Current research and challenges," in 2016 International Conference on Advances in Computing, Communication, Automation (ICACCA) (Spring), April 2016, pp. 1-6. otwiera się w nowej karcie
  3. A. A. Alsahli and H. U. Khan, "Security challenges of wireless sensors devices (motes)," in 2014 World Congress on Computer Applications and Information Systems (WCCAIS), Jan 2014, pp. 1-9. otwiera się w nowej karcie
  4. A. M. Gamundani, "An impact review on internet of things attacks," in 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), May 2015, pp. 114-118. otwiera się w nowej karcie
  5. A. Blilat, A. Bouayad, N. E. H. Chaoui, and M. E. Ghazi, "Wireless sensor network: Security challenges," in 2012 National Days of Network Security and Systems, April 2012, pp. 68-72. otwiera się w nowej karcie
  6. A. Mpitziopoulos and D. Gavalas, "An effective defensive node against jamming attacks in sensor networks," Security and Communication Networks, vol. 2, no. 2, pp. 145-163, 2009. otwiera się w nowej karcie
  7. B. Yu and L. Y. Zhang, "An improved detection method for different types of jamming attacks in wireless networks," in The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014), Nov 2014, pp. 553-558. otwiera się w nowej karcie
  8. R. A. Poisel, Modern Communications Jamming Principles and Techniques, 2nd ed. Norwood, MA, USA: Artech House, Inc., 2011. [9] "Matlab R2016b Documentation," 2017. [Online]. otwiera się w nowej karcie
  9. A. A. Hassan, W. E. Stark, and J. E. Hershey, "Error rate for optimal follower tone-jamming," IEEE Transactions on Communications, vol. 44, no. 5, pp. 546-548, May 1996. otwiera się w nowej karcie
  10. F. C. M. Lau and C. K. Tse, Chaos-Based Digital Communication Systems: Operating Principles, Analysis Methods, and Performance Evaluation. Springer Publishing Company, Incorporated, 2011. otwiera się w nowej karcie
  11. M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, "Short paper: Reactive jamming in wireless networks: How realistic is the threat?" in Proceedings of the Fourth ACM Conference on Wireless Network Security, ser. WiSec '11. New York, NY, USA: ACM, 2011, pp. 47-52. otwiera się w nowej karcie
  12. JenNet-IP WPAN Stack User Guide.
  13. "IEEE Standard for Local and metropolitan area networks-Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)," IEEE Std. 802.15.4-2011 (Revision of IEEE Std 802.15.4-2006), pp. 1-314, Sept 2011. otwiera się w nowej karcie

wyświetlono 8 razy

Publikacje, które mogą cię zainteresować

Meta Tagi