Security Attacks in IEEE 802.15.4: A Review Disassociation Procedure
The specification of Physical layer PHY and MAC layer for Low Rate Wireless Personal Area network (LR-WPAN) is provided in the IEEE 802.15.4 standard. This standard offers four services of security to protect the frames during the transmission process. Disassociation is one of features provided by the MAC layer in IEEE 802.15.4 that is sent by devices to leave the network or the coordinator PAN to force the associated device to leave the network. Wherefore, Disassociation procedure should initiate and finish between legitimate nodes to avoid DoS attacks that can affect services of the network. The aim of this paper is to analyze and review Disassociation procedure to verify the process is secure and free of weaknesses that can threaten the security in WPAN. In the analysis of Disassociation procedure, it was found that the disassociation process can face a new potential attack. This potential attack can be executed in two different scenarios based on the target node.
KeywordsIoT security Disassociation procedure IEEE 802.15.4 standard
This work is fully supported by Qassim University by the contract no. (2337-alrasscac-2018-1-14-S).
- 1.Alabdulatif, A., Ma, X.: Analysing the EAP-TLS handshake and the 4-way handshake of the 802.11i standard. Int. J. Inf. Secur. Res. (IJISR) 3(34), 439–448 (2013)Google Scholar
- 2.Alabdulatif, A., Ma, X., Nolle, L.: Analysing and attacking the 4-way handshake of ieee 802.11i standard. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 382–387. IEEE (2013)Google Scholar
- 3.Committee, L.S., et al.: IEEE std 802.15.4-2015 (revision of IEEE std 802.15.4-2011). IEEE standard for low-rate wireless personal area networks (LR-WPANS). IEEE Computer Society (2016)Google Scholar
- 4.Amin, Y.M., Abdel-Hamid, A.T.: A comprehensive taxonomy and analysis of IEEE 802.15.4 attacks. J. Electr. Comput. Eng. 2016, 4 (2016)Google Scholar
- 6.Hussain, I., Negi, M.C., Pandey, N.: Security in ZIGBEE using steganography for IoT communications. In: System Performance and Management Analytics, pp. 217–227. Springer (2019)Google Scholar
- 7.Cheema, R., Bansal, D., Sofat, S.: Deauthentication/disassociation attack: implementation and security in wireless mesh networks. Int. J. Comput. Appl. 23(7), 7–15 (2011)Google Scholar
- 8.Razzaq, M.A., Gill, S.H., Qureshi, M.A., Ullah, S.: Security issues in the Internet of Things (IoT): a comprehensive study. Int. J. Adv. Comput. Sci. Appl. 8(6), 383 (2017)Google Scholar
- 10.Amoozadeh, M.: Towards Robust and Secure Collaborative Driving and Interactive Traffic Intersections. University of California, Davis (2018)Google Scholar
- 11.Amin, Y.M., Abdel-Hamid, A.T.: A simulation model of IEEE 802.15.4 GTS mechanism and GTS attacks in OMNET ++/MiXiM + NERA. Comput. Inf. Sci. 11(1), 78–89 (2018)Google Scholar
- 12.Nzabahimana, J.P.: Analysis of security and privacy challenges in Internet of Things. In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), pp. 175–178. IEEE (2018)Google Scholar
- 15.Frustaci, M., Pace, P., Aloi, G.: Securing the IoT world: issues and perspectives. In: 2017 IEEE Conference on Standards for Communications and Networking (CSCN), pp. 246–251. IEEE (2017)Google Scholar
- 16.Perlman, R., Kaufman, C., Speciner, M.: Network Security: Private Communication in a Public World. Pearson Education India (2016)Google Scholar