Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
An Experimental Study of Attacks on the Availability of Glossy
RISE, Swedish ICT, SICS, Security Lab.ORCID iD: 0000-0001-8192-0893
RISE, Swedish ICT, SICS, Computer Systems Laboratory.ORCID iD: 0000-0002-2586-8573
2014 (English)In: Computers & electrical engineering, ISSN 0045-7906, E-ISSN 1879-0755Article in journal (Refereed) Published
Abstract [en]

Glossy is a reliable and low latency flooding mechanism designed primarily for distributed communication in wireless sensor networks (WSN). Glossy achieves its superior performance over tree-based wireless sensor networks by exploiting identical concurrent transmissions. WSNs are subject to wireless attacks aimed to disrupt the legitimate network operations. Real-world deployments require security and the current Glossy implementation has no built-in security mechanisms. In this paper, we explore the effectiveness of several attacks that attempt to break constructive interference in Glossy. Our results show that Glossy is quite robust to approaches where attackers do not respect the timing constraints necessary to create constructive interference. Changing the packet content, however, has a severe effect on the packet reception rate that is even more detrimental than other physical layer denial-of-service attacks such as jamming. We also discuss potential countermeasures to address these security threats and vulnerabilities.

Place, publisher, year, edition, pages
Elsevier , 2014, 7.
Keywords [en]
Glossy, Security Attacks, Sensor Networks, Network Security, Distributed Communication
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:ri:diva-24351OAI: oai:DiVA.org:ri-24351DiVA, id: diva2:1043432
Projects
PromosCALIPSOAvailable from: 2016-10-31 Created: 2016-10-31 Last updated: 2018-07-20Bibliographically approved

Open Access in DiVA

No full text in DiVA

Authority records BETA

Raza, ShahidVoigt, Thiemo

Search in DiVA

By author/editor
Raza, ShahidVoigt, Thiemo
By organisation
Security LabComputer Systems Laboratory
In the same journal
Computers & electrical engineering
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 14 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
v. 2.35.2