Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2016, Article ID 7165952, 12 pages
Review Article

A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

Department of Networks Engineering, German University in Cairo, Cairo 11835, Egypt

Received 30 October 2015; Revised 10 June 2016; Accepted 27 June 2016

Academic Editor: Vinod Sharma

Copyright © 2016 Yasmin M. Amin and Amr T. Abdel-Hamid. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. IEEE Standard for Information Technology, “Local and metropolitan area networks—specific requirements—part 15.4: wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for low rate Wireless Personal Area Networks (WPANs),” IEEE 802.15.4-2006, 2006. View at Google Scholar
  2. S. C. Ergen, ZigBee/IEEE 802.15.4 Summary, 2004,
  3. P. Jokar, H. Nicanfar, and V. C. M. Leung, “Specification-based intrusion detection for home area networks in smart grids,” in Proceedings of the IEEE 2nd International Conference on Smart Grid Communications (SmartGridComm '11), pp. 208–213, Brussels, Belgium, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. C. P. O'Flynn, “Message denial and alteration on IEEE 802.15.4 low-power radio networks,” in Proceedings of the 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS '11), pp. 1–5, IEEE, Paris, France, February 2011. View at Publisher · View at Google Scholar · View at Scopus
  5. A. D. Wood, J. A. Stankovic, and G. Zhou, “DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks,” in Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '07), pp. 60–69, IEEE, San Diego, Calif, USA, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. R. Sokullu, I. Korkmaz, O. Dagdeviren, A. Mitseva, and N. R. Prasad, An Investigation of IEEE 802.15.4 MAC Layer Attacks,
  7. C. Balarengadurai and S. Saraswalhi, “Comparative analysis of detection of DDoS attacks in IEEE 802.15.4 low rate wireless personal area network,” in Proceedings of the International Conference on Modelling Optimization and Computing, vol. 38, pp. 3855–3863, April 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Wilhelm, J. B. Schmitt, and V. Lenders, “Practical Message Manipulation Attacks in IEEE 802.15.4 Wireless Networks,” 2015,
  9. D. Martins and H. Guyennet, “Attacks with steganography in PHY and MAC layers of 802.15.4 protocol,” in Proceedings of the 5th International Conference on Systems and Networks Communications (ICSNC '10), pp. 31–36, Nice, France, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  10. J. V. Kumar, A. Jain, and P. N. Barwal, “Wireless sensor networks: security issues, challenges and solutions,” International Journal of Information and Computation Technology (IJICT), vol. 4, no. 8, pp. 859–868, 2014. View at Google Scholar
  11. Y. M. Amin and A. T. Abdel-Hamid, “Classification and analysis of IEEE 802.15.4 MAC layer attacks,” in Proceedings of the 11th International Conference on Innovations in Information Technology (IIT '15), pp. 74–79, Dubai, United Arab Emirates, November 2015. View at Publisher · View at Google Scholar
  12. R. Sokullu, O. Dagdeviren, and I. Korkmaz, “On the IEEE 802.15.4 MAC layer attacks: GTS attack,” in Proceedings of the 2nd International Conference on Sensor Technologies and Applications (SENSORCOMM '08), pp. 673–678, Cap Esterel, France, August 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. V. B. Mišić, J. Fung, and J. Mišić, “MAC layer security of 802.15.4-compliant networks,” in Proceedings of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS '05), pp. 847–854, IEEE, Washington, DC, USA, November 2005. View at Publisher · View at Google Scholar · View at Scopus
  14. S. S. Jung, M. Valero, A. Bourgeois, and R. Beyah, “Attacking Beacon-enabled 802.15.4 networks,” in Security and Privacy in Communication Networks, vol. 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 253–271, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar
  15. F. Amini, J. Misic, and R. Eskicioglu, Simulation and Evaluation of Security and Intrusion Detection in IEEE 802.15.4 Network, University of Manitoba, Winnipeg, Canada, 2008.