Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15.4e TSCH networks
RISE - Research Institutes of Sweden (2017-2019), ICT, SICS. (Security Lab)ORCID iD: 0000-0001-8842-9810
University of Pisa, Italy.
University of Pisa, Italy.
University of Pisa, Italy.
Show others and affiliations
2018 (English)In: ACM transactions on sensor networks, ISSN 1550-4867, E-ISSN 1550-4859, Vol. 15, no 1, article id a3Article in journal (Refereed) Published
Abstract [en]

The MAC standard amendment IEEE 802.15.4e is designed to meet the requirements of industrial and critical applications. In particular, the Time Slotted Channel Hopping (TSCH) mode divides time into periodic, equally-sized, slotframes composed of transmission timeslots. Then, it combines timeslotted access with multi-channel and channel hopping capabilities, providing large network capacity, high reliability and predictable latency, while ensuring energy efficiency. Since every network node considers the same timeslots at each sloframe and selects physical channels according to a periodic function, TSCH produces a steady channel utilization pattern. This can be exploited by a selective jammer to entirely thwart communications of a victim node, in a way that is stealthy, effective and extremely energy efficient. This paper shows how a selective jamming attack can be successfully performed even though TSCH uses the IEEE 802.15.4e security services. Furthermore, we propose DISH, a countermeasure which randomly permutes the timeslot and channel utilization patterns at every slotframe in a consistent and completely distributed way, without requiring any additional message exchange. We have implemented DISH for the Contiki OS and tested its effectiveness onTelosB sensor nodes. Quantitative analysis for different network configurations shows that DISH effectively contrasts selective jamming with negligible performance penalty.

Place, publisher, year, edition, pages
2018. Vol. 15, no 1, article id a3
Keywords [en]
IEEE 802.15.4e, TSCH, Security, Selective Jamming, Denial of Service, Secure Schedule Permutation
National Category
Communication Systems Embedded Systems
Identifiers
URN: urn:nbn:se:ri:diva-33956DOI: 10.1145/3241052Scopus ID: 2-s2.0-85058779592OAI: oai:DiVA.org:ri-33956DiVA, id: diva2:1229818
Available from: 2018-07-02 Created: 2018-07-02 Last updated: 2023-05-25Bibliographically approved

Open Access in DiVA

DISH(2069 kB)267 downloads
File information
File name FULLTEXT01.pdfFile size 2069 kBChecksum SHA-512
fddf97c2f7a73811afa3d996c7ffc7e56dbfdb00dcc86557a66410bd38a565a8645719071d98455fec2862797cf709954643e994bff78efbd562723fc70c1210
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Tiloca, Marco

Search in DiVA

By author/editor
Tiloca, Marco
By organisation
SICS
In the same journal
ACM transactions on sensor networks
Communication SystemsEmbedded Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 267 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 679 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf