DISH: Distributed SHuffling Against Selective Jamming Attack in IEEE 802.15.4e TSCH Networks

被引:15
作者
Tiloca, Marco [1 ,5 ]
De Guglielmo, Domenico [2 ,6 ]
Dini, Gianluca [3 ]
Anastasi, Giuseppe [3 ]
Das, Sajal K. [4 ]
机构
[1] RISE SICS, Kista, Sweden
[2] Univ Pisa, Pisa, Italy
[3] Univ Pisa, Dept Informat Engn, Via Diotisalvi 2, I-56122 Pisa, Italy
[4] Missouri Univ Sci & Technol, Dept Comp Sci, 325B Comp Sci Bldg,500 W 15th St, Rolla, MO 65409 USA
[5] RISE Res Inst Sweden, Box 1263, S-16429 Kista, Sweden
[6] Mind Srl, Via 36 Reggimento Pistoia 168, I-41126 Modena, Italy
关键词
IEEE; 802.15.4e; TSCH; security; selective jamming; denial of service; secure schedule permutation;
D O I
10.1145/3241052
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The MAC standard amendment IEEE 802.15.4e is designed to meet the requirements of industrial and critical applications. In particular, the Time Slotted Channel Hopping (TSCH) mode divides time into periodic, equally sized, slotframes composed of transmission timeslots. Then, it combines time slotted access with multichannel and channel hopping capabilities, providing large network capacity, high reliability, and predictable latency while ensuring energy efficiency. Since every network node considers the same timeslots at each slotframe and selects physical channels according to a periodic function, TSCH produces a steady channel utilization pattern. This can be exploited by a selective jammer to entirely thwart communications of a victim node in a way that is stealthy, effective, and extremely energy efficient. This article shows how a selective jamming attack can be successfully performed even though TSCH uses the IEEE 802.15.4e security services. Furthermore, we propose DISH, a countermeasure which randomly permutes the timeslot and channel utilization patterns at every slotframe in a consistent and completely distributed way without requiring any additional message exchange. We have implemented DISH for the Contiki OS and tested its effectiveness on TelosB sensor nodes. Quantitative analysis for different network configurations shows that DISH effectively contrasts selective jamming with negligible performance penalty.
引用
收藏
页数:28
相关论文
共 43 条
[1]  
[Anonymous], 2001, Handbook of Applied Cryptography
[2]  
[Anonymous], 2010, UNDERSTANDING CRYPTO
[3]  
[Anonymous], 2005, RANDOMNESS REQUIREME
[4]  
[Anonymous], P 2011 INT C DISTR C
[5]  
[Anonymous], 2013, P 18 IEEE C EM TECHN
[6]  
[Anonymous], ACM T EMBED COMPUT S
[7]  
Ashraf F, 2012, IEEE INT CONF MOB, P317, DOI 10.1109/MASS.2012.6502531
[8]   Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks [J].
Chiang, Jerry T. ;
Hu, Yih-Chun .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (01) :286-298
[9]   A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks [J].
Daidone, Roberta ;
Dini, Gianluca ;
Tiloca, Marco .
WIRELESS NETWORKS, 2014, 20 (05) :1223-1235
[10]   IEEE 802.15.4e: A survey [J].
De Guglielmo, Domenico ;
Brienza, Simone ;
Anastasi, Giuseppe .
COMPUTER COMMUNICATIONS, 2016, 88 :1-24