Advertisement

Security Attacks in IEEE 802.15.4: A Review Disassociation Procedure

  • Abdullah A. AlabdulatifEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1073)

Abstract

The specification of Physical layer PHY and MAC layer for Low Rate Wireless Personal Area network (LR-WPAN) is provided in the IEEE 802.15.4 standard. This standard offers four services of security to protect the frames during the transmission process. Disassociation is one of features provided by the MAC layer in IEEE 802.15.4 that is sent by devices to leave the network or the coordinator PAN to force the associated device to leave the network. Wherefore, Disassociation procedure should initiate and finish between legitimate nodes to avoid DoS attacks that can affect services of the network. The aim of this paper is to analyze and review Disassociation procedure to verify the process is secure and free of weaknesses that can threaten the security in WPAN. In the analysis of Disassociation procedure, it was found that the disassociation process can face a new potential attack. This potential attack can be executed in two different scenarios based on the target node.

Keywords

IoT security Disassociation procedure IEEE 802.15.4 standard 

Notes

Acknowledgments

This work is fully supported by Qassim University by the contract no. (2337-alrasscac-2018-1-14-S).

References

  1. 1.
    Alabdulatif, A., Ma, X.: Analysing the EAP-TLS handshake and the 4-way handshake of the 802.11i standard. Int. J. Inf. Secur. Res. (IJISR) 3(34), 439–448 (2013)Google Scholar
  2. 2.
    Alabdulatif, A., Ma, X., Nolle, L.: Analysing and attacking the 4-way handshake of ieee 802.11i standard. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 382–387. IEEE (2013)Google Scholar
  3. 3.
    Committee, L.S., et al.: IEEE std 802.15.4-2015 (revision of IEEE std 802.15.4-2011). IEEE standard for low-rate wireless personal area networks (LR-WPANS). IEEE Computer Society (2016)Google Scholar
  4. 4.
    Amin, Y.M., Abdel-Hamid, A.T.: A comprehensive taxonomy and analysis of IEEE 802.15.4 attacks. J. Electr. Comput. Eng. 2016, 4 (2016)Google Scholar
  5. 5.
    Elijah, O., Rahman, T.A., Orikumhi, I., Leow, C.Y., Hindia, M.N.: An overview of Internet of Things (IoT) and data analytics in agriculture: benefits and challenges. IEEE Internet Things J. 5(5), 3758–3773 (2018)CrossRefGoogle Scholar
  6. 6.
    Hussain, I., Negi, M.C., Pandey, N.: Security in ZIGBEE using steganography for IoT communications. In: System Performance and Management Analytics, pp. 217–227. Springer (2019)Google Scholar
  7. 7.
    Cheema, R., Bansal, D., Sofat, S.: Deauthentication/disassociation attack: implementation and security in wireless mesh networks. Int. J. Comput. Appl. 23(7), 7–15 (2011)Google Scholar
  8. 8.
    Razzaq, M.A., Gill, S.H., Qureshi, M.A., Ullah, S.: Security issues in the Internet of Things (IoT): a comprehensive study. Int. J. Adv. Comput. Sci. Appl. 8(6), 383 (2017)Google Scholar
  9. 9.
    Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2017)CrossRefGoogle Scholar
  10. 10.
    Amoozadeh, M.: Towards Robust and Secure Collaborative Driving and Interactive Traffic Intersections. University of California, Davis (2018)Google Scholar
  11. 11.
    Amin, Y.M., Abdel-Hamid, A.T.: A simulation model of IEEE 802.15.4 GTS mechanism and GTS attacks in OMNET ++/MiXiM + NERA. Comput. Inf. Sci. 11(1), 78–89 (2018)Google Scholar
  12. 12.
    Nzabahimana, J.P.: Analysis of security and privacy challenges in Internet of Things. In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), pp. 175–178. IEEE (2018)Google Scholar
  13. 13.
    Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4(5), 1250–1258 (2017)CrossRefGoogle Scholar
  14. 14.
    Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRefGoogle Scholar
  15. 15.
    Frustaci, M., Pace, P., Aloi, G.: Securing the IoT world: issues and perspectives. In: 2017 IEEE Conference on Standards for Communications and Networking (CSCN), pp. 246–251. IEEE (2017)Google Scholar
  16. 16.
    Perlman, R., Kaufman, C., Speciner, M.: Network Security: Private Communication in a Public World. Pearson Education India (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Computer Department, College of Sciences and ArtsQassim UniversityAl-RassSaudi Arabia

Personalised recommendations