A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs). With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2016-01-01
|
Series: | Journal of Electrical and Computer Engineering |
Online Access: | http://dx.doi.org/10.1155/2016/7165952 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832555517430464512 |
---|---|
author | Yasmin M. Amin Amr T. Abdel-Hamid |
author_facet | Yasmin M. Amin Amr T. Abdel-Hamid |
author_sort | Yasmin M. Amin |
collection | DOAJ |
description | The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs). With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks. |
format | Article |
id | doaj-art-2761beb115d043aeae8529cbc37719f4 |
institution | Kabale University |
issn | 2090-0147 2090-0155 |
language | English |
publishDate | 2016-01-01 |
publisher | Wiley |
record_format | Article |
series | Journal of Electrical and Computer Engineering |
spelling | doaj-art-2761beb115d043aeae8529cbc37719f42025-02-03T05:47:54ZengWileyJournal of Electrical and Computer Engineering2090-01472090-01552016-01-01201610.1155/2016/71659527165952A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 AttacksYasmin M. Amin0Amr T. Abdel-Hamid1Department of Networks Engineering, German University in Cairo, Cairo 11835, EgyptDepartment of Networks Engineering, German University in Cairo, Cairo 11835, EgyptThe IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs). With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.http://dx.doi.org/10.1155/2016/7165952 |
spellingShingle | Yasmin M. Amin Amr T. Abdel-Hamid A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks Journal of Electrical and Computer Engineering |
title | A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks |
title_full | A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks |
title_fullStr | A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks |
title_full_unstemmed | A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks |
title_short | A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks |
title_sort | comprehensive taxonomy and analysis of ieee 802 15 4 attacks |
url | http://dx.doi.org/10.1155/2016/7165952 |
work_keys_str_mv | AT yasminmamin acomprehensivetaxonomyandanalysisofieee802154attacks AT amrtabdelhamid acomprehensivetaxonomyandanalysisofieee802154attacks AT yasminmamin comprehensivetaxonomyandanalysisofieee802154attacks AT amrtabdelhamid comprehensivetaxonomyandanalysisofieee802154attacks |