A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs). With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless...

Full description

Saved in:
Bibliographic Details
Main Authors: Yasmin M. Amin, Amr T. Abdel-Hamid
Format: Article
Language:English
Published: Wiley 2016-01-01
Series:Journal of Electrical and Computer Engineering
Online Access:http://dx.doi.org/10.1155/2016/7165952
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832555517430464512
author Yasmin M. Amin
Amr T. Abdel-Hamid
author_facet Yasmin M. Amin
Amr T. Abdel-Hamid
author_sort Yasmin M. Amin
collection DOAJ
description The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs). With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.
format Article
id doaj-art-2761beb115d043aeae8529cbc37719f4
institution Kabale University
issn 2090-0147
2090-0155
language English
publishDate 2016-01-01
publisher Wiley
record_format Article
series Journal of Electrical and Computer Engineering
spelling doaj-art-2761beb115d043aeae8529cbc37719f42025-02-03T05:47:54ZengWileyJournal of Electrical and Computer Engineering2090-01472090-01552016-01-01201610.1155/2016/71659527165952A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 AttacksYasmin M. Amin0Amr T. Abdel-Hamid1Department of Networks Engineering, German University in Cairo, Cairo 11835, EgyptDepartment of Networks Engineering, German University in Cairo, Cairo 11835, EgyptThe IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs). With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.http://dx.doi.org/10.1155/2016/7165952
spellingShingle Yasmin M. Amin
Amr T. Abdel-Hamid
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
Journal of Electrical and Computer Engineering
title A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
title_full A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
title_fullStr A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
title_full_unstemmed A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
title_short A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
title_sort comprehensive taxonomy and analysis of ieee 802 15 4 attacks
url http://dx.doi.org/10.1155/2016/7165952
work_keys_str_mv AT yasminmamin acomprehensivetaxonomyandanalysisofieee802154attacks
AT amrtabdelhamid acomprehensivetaxonomyandanalysisofieee802154attacks
AT yasminmamin comprehensivetaxonomyandanalysisofieee802154attacks
AT amrtabdelhamid comprehensivetaxonomyandanalysisofieee802154attacks