Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
JAMMY: a Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs
RISE, Swedish ICT, SICS, Security Lab.ORCID iD: 0000-0001-8842-9810
University of Pisa, Italy.
University of Pisa, Italy.
University of Pisa, Italy.
Show others and affiliations
2015 (English)In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 14, no 4, p. 392-405Article in journal (Refereed) Published
Abstract [en]

Time Division Multiple Access (TDMA) is often used in Wireless Sensor Networks (WSNs), especially for critical applications, as it provides high energy efficiency, guaranteed bandwidth, bounded and predictable latency, and absence of collisions. However, TDMA is vulnerable to selective jamming attacks. In TDMA transmission, slots are typically pre-allocated to sensor nodes, and each slot is used by the same node for a number of consecutive superframes. Hence, an adversary could thwart a victim node’s communication by simply jamming its slot(s). Such attack turns out to be effective, energy efficient, and extremely difficult to detect. In this paper, we present JAMMY, a distributed and dynamic solution to selective jamming in TDMA-based WSNs. Unlike traditional approaches, JAMMY changes the slot utilization pattern at every superframe, thus making it unpredictable to the adversary. JAMMY is decentralized, as sensor nodes determine the next slot utilization pattern in a distributed and autonomous way. Results from performance analysis of the proposed solution show that JAMMY introduces negligible overhead yet allows multiple nodes to join the network, in a limited number of superframes.

Place, publisher, year, edition, pages
2015, 10. Vol. 14, no 4, p. 392-405
Keywords [en]
decentralized slot acquisition, DoS, secure slot permutation, security, selective jamming, TDMA, WSNs
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:ri:diva-24446DOI: 10.1109/TDSC.2015.2467391Scopus ID: 2-s2.0-85027724405OAI: oai:DiVA.org:ri-24446DiVA, id: diva2:1043527
Projects
SEGRIDAvailable from: 2016-10-31 Created: 2016-10-31 Last updated: 2023-05-25Bibliographically approved

Open Access in DiVA

fulltext(831 kB)620 downloads
File information
File name FULLTEXT01.pdfFile size 831 kBChecksum SHA-512
c35c85fa5b521971f05f2de9c2718ac83479ef20276e695c89f1e7fe2899d7533b96e7219d98733e4acdb29b72fb47eadd5329628e010c81b797886558d4d60c
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Tiloca, Marco

Search in DiVA

By author/editor
Tiloca, Marco
By organisation
Security Lab
In the same journal
IEEE Transactions on Dependable and Secure Computing
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 620 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 278 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf