期刊文献+

信标模式下IEEE802.15.4网络漏洞分析及利用研究 被引量:1

Analyzing and Exploiting Vulnerabilities of Beacon-Enabled IEEE802.15.4 Networks
下载PDF
导出
摘要 IEEE802.15.4因其低速率、低成本、低功耗和高质量特点,成为无线传感器网络MAC层标准,已被广泛应用于各种领域,其安全漏洞一旦被攻击者发现并利用将造成难以估量的后果。为发现当前协议标准中存在的问题,文章对IEEE802.15.4协议的MAC层标准进行了分析,发现了信标广播漏洞和GTS管理机制等漏洞,并给出了信标同步扰乱、阻止节点接入、空闲时隙抢占和空闲节点仿冒4种漏洞利用模式。漏洞及其利用模式的发现可为研究人员改进协议设计的安全性提供基本依据。 With the characteristics of low rate, low cost, low power consumption and high quality, the IEEE802.15.4 standard became the MAC protocol for WSNs and has been widely used in vari- ous fields. The discovery and exploiting of vulnerabilities will cause inestimable consequences. To expose problems existed in protocol, the MAC standard of IEEE802.15.4 protocol was analyzed and vulnerabilities of beacon broadcasting and GTS management scheme were discovered. Based on that, four methods exploiting vulnerahilities were proposed, including beacon synchronization interference, denial of node access, free time slots occupying and idle node forgery. Analyzing and exploi- ting of vulnerabilities provide a fundamental basis for researchers to improve security of protocol design.
出处 《信息工程大学学报》 2016年第3期358-364,共7页 Journal of Information Engineering University
基金 国家自然科学基金资助项目(9140C130103 120C136062) 河南省科技创新杰出青年计划资助项目(104100510025)
关键词 IEEE802.15.4 信标广播 GTS管理机制 漏洞利用 IEEES02.15.4 beacon broadcasting GTS management scheme vulnerability exploiting
  • 相关文献

参考文献14

  • 1IEEE 802 Working Group. IEEE Standard for Local and Metropolitan Area Networks-Part 15.4: Low-Rate Wire- less Personal Area Networks (LR-WPANs) [ S ]. IEEE Std, 2011, 802: 4-2011. 被引量:1
  • 2Akyildiz I F,Vuran M C. Wireless sensor networks[ M].Chichester : John Wiley & Sons, 2010. 被引量:1
  • 3Anastasi G, Conti M, Di Francesco M. A comprehensive analysis of the MAC unreliability problem in IEEE 802. 15. 4 wireless sensor networks [ J]. Industrial Informat- ics, 2011, 7(1) : 52-65. 被引量:1
  • 4Pelechrinis K, Iliofotou M, Krishnamurthy S V. Denial of service attacks in wireless networks: The case of jam- mers [ J. Communications Surveys & Tutorials, 2011, 13 ( 2 ) : 245-257. 被引量:1
  • 5DeBruhl B, Tague P. How to jam without getting caught : Analysis and empirical study of stealthy periodic jamming [ C]//Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2013 10th Annual IEEE Communi- cations Society Conference on. 2013: 496-504. 被引量:1
  • 6Bntani B, Shukla P K, Silakari S. Optimized and Execu- tive Survey of Physical Node Capture Attack in Wireless Sensor Network [ J ]. International Journal of Computer Network and Information Security (IJCNIS), 2014, 6 (11) : 26-31. 被引量:1
  • 7Wilhelm M, Martinovic I, Schmitt J B, et al. Reactive Jamming in Wireless Networks: How Realistic is The Threat[ C]//Proc. 2011 ACM WiSec. 2011:47-52. 被引量:1
  • 8Spuhler M, Giustiniano D, Lenders V, et al. Detection of Reactive Jamming in DSSS-based Wireless Communi- cations[ J l. IEEE Transactions on Wireless Communica- tions, 2014,13(3) :43-48. 被引量:1
  • 9Radosavac S, COrdenas A A, Baras J S, et al. Detecting IEEE 802. 11 MAC layer misbehavior in ad hoc net- works: Robust strategies against individual and colluding attackers [ J ]. Journal of Computer Security, 2007, 15 (1) : 103-128. 被引量:1
  • 10Sastry N, Wagner D. Security considerations for IEEE 802,15. 4 networks[ C]//Proceedings of the 3rd ACM workshop on Wireless security. 2004: 32-42. 被引量:1

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部