Performance Evaluation of IEEE 802.15.4 under Jamming DoS Attack

Mihajlov, Boris and Bogdanoski, Mitko (2013) Performance Evaluation of IEEE 802.15.4 under Jamming DoS Attack. In: XI International Conference ETAI 2013, 26-28 Sept 2013, Ohrid, R. Macedonia.

[thumbnail of Programme_ETAI_2013_final.pdf]
Preview
Text
Programme_ETAI_2013_final.pdf

Download (435kB) | Preview

Abstract

Wireless Sensor Network (WSN) is a wireless network consisting of small nodes with sensing, computation, and wireless communications capabilities. The design of wireless sensor networks depends of many factors, such as transmission errors, network topology and power consumption. Many routing protocols, protocols for data transmission, are specifically designed for wireless sensor networks where energy consumption is essential. This paper provides a brief description of the IEEE 802.15.4/ZigBee standard, also surveys the known attacks on wireless sensor networks. WSNs are particularly vulnerable to several key types of attacks. These attacks can be performed in several different ways. One of the commonly used methods is a denial of service (DoS), but there are also other types of attacks from which we should be aware as a traffic analysis, privacy violation, physical attacks etc. Three MAC protocols, such as IEEE 802.15.4 MAC, T-MAC, and S-MAC are proposed to analyze the performance of the WSN under DoS attack using OMNeT++ simulator. Different application scenarios have been evaluated. Performance parameters such as throughput, network delay, energy consumption in the coordinator, and network load are the main considered factors in our study.

Item Type: Conference or Workshop Item (Paper)
Subjects: Natural sciences > Computer and information sciences
Engineering and Technology > Electrical engineering, electronic engineering, information engineering
Divisions: Military Academy
Depositing User: Mitko Bogdanoski
Date Deposited: 27 Jan 2014 11:42
Last Modified: 27 Jan 2014 11:42
URI: https://eprints.ugd.edu.mk/id/eprint/8825

Actions (login required)

View Item View Item