A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks

作者: Shahnaz Saleem , Sana Ullah , Kyung Sup Kwak

DOI: 10.3390/S110201383

关键词:

摘要: A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions surrounding environment. It supports number innovative interesting applications, including ubiquitous healthcare Consumer Electronics (CE) applications. Since WBAN collect sensitive (life-critical) information may operate in hostile environments, they require strict security mechanisms prevent malicious interaction with system. In this paper, we first highlight major requirements Denial Service (DoS) attacks at Physical, Medium Access Control (MAC), Network, Transport layers. Then discuss IEEE 802.15.4 framework identify vulnerabilities context WBAN. Different types on Contention Period (CAP) Free (CFP) parts superframe analyzed discussed. observed smart attacker can successfully corrupt an increasing GTS slots CFP period considerably affect Quality (QoS) (since most data carried period). As increase attackers corrupted eventually increased, which prevents legitimate utilize bandwidth efficiently. This means direct adaptation for not totally secure certain New solutions required integrate high level

参考文章(26)
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Sana Ullah, Henry Higgins, Bart Braem, Benoit Latre, Chris Blondia, Ingrid Moerman, Shahnaz Saleem, Ziaur Rahman, Kyung Sup Kwak, A Comprehensive Survey of Wireless Body Area Networks Journal of Medical Systems. ,vol. 36, pp. 1065- 1094 ,(2012) , 10.1007/S10916-010-9571-3
Stefan Savage, John Bellardo, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions usenix security symposium. pp. 2- 2 ,(2003)
S. Radosavac, Alvaro A. Cárdenas, John S. Baras, George V. Moustakides, Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers security of ad hoc and sensor networks. ,vol. 15, pp. 103- 128 ,(2007) , 10.3233/JCS-2007-15105
Yang Xiao, Hsiao-Hwa Chen, Bo Sun, Ruhai Wang, Sakshi Sethi, MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks Eurasip Journal on Wireless Communications and Networking. ,vol. 2006, pp. 81- 81 ,(2006) , 10.1155/WCN/2006/93830
PHYLIS A. WHITNEY, DOMINO Proceedings of the 2nd international conference on Mobile systems, applications, and services - MobiSYS '04. pp. 84- 97 ,(2004) , 10.1145/990064.990077
Svetlana Radosavac, John S. Baras, Iordanis Koutsopoulos, A framework for MAC protocol misbehavior detection in wireless networks Proceedings of the 4th ACM workshop on Wireless security - WiSe '05. pp. 33- 42 ,(2005) , 10.1145/1080793.1080801
Elaine Shi, A. Perrig, Designing secure sensor networks IEEE Wireless Communications. ,vol. 11, pp. 38- 43 ,(2004) , 10.1109/MWC.2004.1368895
Shahnaz Saleem, Sana Ullah, Hyeong Seon Yoo, None, On the Security Issues in Wireless Body Area Networks. International Journal of Digital Content Technology and Its Applications. ,vol. 3, pp. 178- 184 ,(2009)
P. Kyasanur, N.H. Vaidya, Detection and handling of MAC layer misbehavior in wireless networks dependable systems and networks. pp. 173- 182 ,(2003) , 10.1109/DSN.2003.1209928