Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)

A paradigm in which household substances around us with embedded computational competences and capable of producing and distributing information is referred to as Internet of Things (IoT). IEEE 802.15.4 presents power efficient MAC layer for Internet of Things (IoT). For the preservation of privacy and security, Internet of Things (IoT) needs stern security mechanism so as to stop mischievous communication inside the IoT structure. For this purpose security weaknesses of the MAC protocol of IEEE 802.15.4 and their most important attacks have to be examined. Also security charter of IEEE 802.15.4 is to be analyzed in order to ascertain their limitations with regard to Internet of Things (IoT). Various ranges of attacks taking place in the Contention Free Period (CFP) in addition to Contention Access Period (CAP) of the super-frame structure needs to be explored and discussed. In view of the shortlisted weaknesses we would be arriving at the conclusion that the IEEE 802.15.4 security charter may be harmonized in accordance with the requirements of the Internet of Things. The missing functionalities may be incorporated in the upper layers of Internet of Things (IoT) Architecture.

[1]  Neeli R. Prasad,et al.  An Investigation on IEEE 802.15.4 MAC Layer Attacks , 2007 .

[2]  Maxim Raya,et al.  DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.

[3]  Michael Richardson security architecture for 6top: requirements and structure , 2014 .

[4]  Louis Coetzee,et al.  The Internet of Things - promise for the future? An introduction , 2011, 2011 IST-Africa Conference Proceedings.

[5]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[6]  Maria Rita Palattella,et al.  Using IEEE802.15.4e TSCH in an LLN context: Overview, Problem Statement and Goals , 2013 .

[7]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[8]  Nitin H. Vaidya,et al.  Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[9]  John S. Baras,et al.  A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.

[10]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[11]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[12]  Yang Xiao,et al.  Security services and enhancements in the IEEE 802.15.4 wireless sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[13]  Jelena Misic,et al.  On Security Attacks in HealthcareWSNs Implemented on 802.15.4 Beacon Enabled Clusters , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[14]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[15]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[16]  John S. Baras,et al.  Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers , 2007, J. Comput. Secur..

[17]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[18]  Ping Pan,et al.  Internet Engineering Task Force , 1995 .

[19]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[20]  Jerry den Hartog,et al.  Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[21]  Ramón Cáceres,et al.  Ubicomp Systems at 20: Progress, Opportunities, and Challenges , 2012, IEEE Pervasive Computing.

[22]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[23]  I. Korkmaz,et al.  On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).

[24]  Kristofer S. J. Pister,et al.  TSMP: TIME SYNCHRONIZED MESH PROTOCOL , 2008 .

[25]  John Seely Brown,et al.  The Origins of Ubiquitous Computing Research at PARC in the Late 1980s , 1999, IBM Syst. J..

[26]  Subir Das,et al.  Security Framework and Key Management Protocol Requirements for 6TSCH , 2013 .