Uma Proposta de Contramedida ao Ataque Jamming em Redes IEEE 802.15.4 utilizando Rádio Cognitivo

  • Fabio Almeida Inatel
  • Marília M. Bontempo National Institute of Telecommunications (INATEL)
  • José Rodrigo dos Santos INATEL
  • Antonio Marcos Alberti INATEL

Resumo


As redes de sensores sem fio utilizam de meios de comunicação compartilhados para a transmissão de dados. Com isto, se torna fácil para um atacante interferir nas transmissõs destas redes através de ataques de negação de serviço conhecidos como Jamming. Estes ataques podem ser feitos através de dispositivos chamados de Jammers, que emitem sinais aleatórios de dados, visando derrubar as comunicações das redes de sensores. Neste artigo, estudamos as características do ataque de interferência Jamming sobre a rede IEEE 802.15.4 e propomos uma contramedida a esse ataque utilizando um sistema de rádio cognitivo definido por software para detectar e proteger a rede.

Palavras-chave: Segurança, Modelos de Ataque, Redes de Sensores, Rádio Cognitivo

Referências

IEEE Std 8 02.15.4TM TM-2 2015 -Revision of IEEE Std 802.15.4-2011. IEEE.

Adamy, D. (2004). EW 102: a second course in electronic warfare. Artech House.

Alberti, A. M., Mazzer, D., Bontempo, M., de Oliveira, L. H., da Rosa Righi, R., and Sodré Jr, A. C. (2017). Cognitive radio in the context of internet of things using a novel future internet architecture called novagenesis. Computers & Electrical Engineering, 57:147-161.

De Nardis, L. and Di Benedetto, M.-G. (2007). Overview of the ieee 802.15. 4/4a stan-dards for low data rate wireless personal data networks. In Positioning, Navigation and Communication, 2007. WPNC'07. 4th Workshop on, pages 285-289. IEEE.

DeBruhl, B. and Tague, P. (2011). Digital filter design for jamming mitigation in 802.15. 4 communication. In Computer Communications and Networks (ICCCN), 2011 Pro-ceedings of 20th International Conference on, pages 1-6. IEEE.

Dunkels, A., Gronvall, B., and Voigt, T. (2004). Contiki-a lightweight and flexible ope-rating system for tiny networked sensors. In Local Computer Networks, 2004. 29th Annual IEEE International Conference on, pages 455-462. IEEE.

Ergen, S. C. (2004). Zigbee/ieee 802.15. 4 summary. UC Berkeley, September, 10:17.

Hamieh, A. and Ben-Othman, J. (2009). Detection of jamming attacks in wireless ad hoc networks using error distribution. In Communications, 2009. ICC'09. IEEE Internati-onal Conference on, pages 1-6. IEEE.

Jondral, F. K. (2005). Software-defined radio: basics and evolution to cognitive radio. EURASIP journal on wireless communications and networking, 2005(3):275-283.

Karapistoli, E., Pavlidou, F.-N., Gragopoulos, I., and Tsetsinas, I. (2010). An overview of the ieee 802.15. 4a standard. IEEE Communications Magazine, 48(1).

Misic, J. and Misic, V. (2008). Wireless personal area networks: Performance, intercon-nection, and security with IEEE 802.15. 4, volume 1. John Wiley & Sons.

Mitola, J. and Maguire, G. Q. (1999). Cognitive radio: making software radios more personal. IEEE personal communications, 6(4):13-18.

Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., and Pantziou, G. (2009). Jaid: An algorithm for data fusion and jamming avoidance on distributed sensor networks. Pervasive and Mobile Computing, 5(2):135-147.

Mpitziopoulos, A., Gavalas, D., Pantziou, G., and Konstantopoulos, C. (2007). Defending wireless sensor networks from jamming attacks. In Personal, Indoor and Mobile Radio Communications, 2007. PIMRC 2007. IEEE 18th International Symposium on, pages 1-5. IEEE.

Muraleedharan, R. and Osadciw, L. A. (2006). Jamming attack detection and countermea-sures in wireless sensor network using ant system. In Wireless Sensing and Processing, volume 6248, page 62480G. International Society for Optics and Photonics.

O'Flynn, C. P. (2011). Message denial and alteration on ieee 802.15. 4 low-power ra-dio networks. In New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on, pages 1-5. IEEE.

Torrieri, D. J. (1985). Principles of secure communication systems. Artech House, Inc.

Wood, A. D. and Stankovic, J. A. (2002). Denial of service in sensor networks. computer, 35(10):54-62.

Wood, A. D., Stankovic, J. A., and Zhou, G. (2007). Deejam: Defeating energy-efficient jamming in ieee 802.15. 4-based wireless networks. In Sensor, Mesh and Ad Hoc Communications and Networks, 2007. SECON'07. 4th Annual IEEE Communications Society Conference on, pages 60-69. IEEE.

Xu, W., Ma, K., Trappe, W., and Zhang, Y. (2006). Jamming sensor networks: attack and defense strategies. IEEE network, 20(3):41-47.

Xu, W., Trappe, W., Zhang, Y., and Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM in-ternational symposium on Mobile ad hoc networking and computing, pages 46-57. ACM.
Publicado
24/09/2019
ALMEIDA, Fabio ; BONTEMPO, Marília M.; DOS SANTOS, José Rodrigo ; ALBERTI, Antonio Marcos . Uma Proposta de Contramedida ao Ataque Jamming em Redes IEEE 802.15.4 utilizando Rádio Cognitivo. In: WORKSHOP DE SEGURANÇA CIBERNÉTICA EM DISPOSITIVOS CONECTADOS (WSCDC), 2. , 2019, Gramado. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2019 . p. 12-22. DOI: https://doi.org/10.5753/wscdc.2019.7702.