An overview of DoSL Attacks in IoT Networks

Authors

  • N. Nasreena Hameeda  Department of Computer Science, Rabiammal Ahamed Maideen College for Women,Tiruvarur,Tamil Nadu, India

DOI:

https://doi.org/10.32628/CSEIT22172120

Keywords:

Internet of things (IoT), channel hoping, communication, radio interfaces, attacks.

Abstract

Many methodologies has been discovered to lower the power consumption in the devices, which is connected to the network in recent years. Many medium access control protocols have been used for low power lossy networks (LLNs).The major goal of introducing this methods is to improve the energy efficiency and to increase the fastness of the communication in the network or the data transmission. The Low power lossy networks is used in many real time scenarios nowadays. These methods use battery-powered devices, which makes transmission easier over lossy links. A particular node generally switches off radio interfaces when no traffic is sent. These devices are made to keep the radio interfaces in ON thus it makes exhausting of batteries causing Denial of sleep attacks. Here, we are going to use time division and channel hoping techniques to get a impact on jamming attacks. We will look on the impacts of such attacks by the ideas got through attacker and to which level the protection allows jamming attacks at upper layers.

References

  1. K. F. Krentz, C. Meinel, and H. Graupner, “Countering Three Denial-of-Sleep Attacks on ContikiMAC,” in international Conference on Embedded Wireless Systems and Networks (EWSN), pp. 108–119, 2017.
  2. V. Manju and M. Sasikumar, “Mitigation of Replay Attack In Wireless Sensor Network,” International Journal on Information Technology, vol. 5, 2014
  3. L. Gu and J. A. Stankovic, “Radio-triggered wake-up for wireless sensor networks,” International Journal of Time-Critical Computing Systems (Real-Time Systems), vol. 29, no. 2, pp. 157–182, 2005
  4. A. T. Capossele, V. Cervo, C. Petrioli, and D. Spenza, “Counteracting DoSL Attacks in Wake-Up-Radio-Based Sensing Systems,” in 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 1–9, June 2016.
  5. D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midriff, “Effects of DoSL Attacks on Wireless Sensor Network MAC Protocols,” IEEE Transactions on Vehicular Technology, vol. 58, pp. 367– 380, Jan 2009
  6. W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks”, 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), (Urbana-Champaign, IL, USA), pp. 46–57, 2005
  7. P. Thubert and T. Watteyne, “6TiSCH: IPv6 over the TSCH mode of IEEE 802.15.4e.” IETF working group.
  8. O. Dagdeviren, R. Sokullu, and I. Korkmaz, “GTS Attack: An IEEE 802.15.4 MAC Layer Attack in Wireless Sensor Networks,” International Journal on Advances in Internet Technology, vol. 2, no. 1, 2009.
  9. K. F. Krentz and C. Meinel, “Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL),” Computer Networks, vol. 148, pp. 60 – 71, January 2019
  10. E. Municio, G. Daneels, M. Vucinic, S. Latre, J. Famaey, Y. Tanaka, K. Brun, K. Muraoka, X. Vilajosana, and T. Watteyne, “Simulating 6TiSCH Networks,” Wiley Transactions on Emerging Telecommunications (ETT), 2018.
  11. M. Tiloca, S. Duquennoy, and G. Dini, “Robust Scheduling against Selective Jamming in 6TiSCH Networks,” draft, IETF, December 2018.
  12. Antoine Gallais, Thin-Hinen Hedli, Valeria Loscrì, Nathalie Mitton. Denial-of-Sleep Attacks against IoT Networks. CoDIT 2019 - 6th International Conference on Control, Decision and Information Technologies, Apr 2019, Paris, France. ffhal-0206060

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
N. Nasreena Hameeda, " An overview of DoSL Attacks in IoT Networks " International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 2, pp.596-601, March-April-2021. Available at doi : https://doi.org/10.32628/CSEIT22172120