Jamming attacks in wireless sensor networks (WSNs) scenarios are detrimental to the performance of these networks and affect the security and stability of the service perceived by users. Therefore, the evaluation of the effectiveness of smart environment platforms based on WSNs has to consider the system performance when data collection is executed under jamming attacks. In this work, we propose an experimental testbed to analyze the performance of a WSN using the IEEE 802.15.4 CSMA/CA unslotted mode under jamming attacks in terms of goodput, packet receive rate (PRR), and energy consumption to assess the risk for users and the network in the smart scenario. The experimental results show that constant and reactive jamming strategies severely impact the evaluated performance metrics and the variance' of the received signal strength (RSS) for some signal-to-interference-plus-noise ratio (SINR) ranges. The measurements obtained using the experimental testbed were correlated with analytical models. The results show that in the presence of one interferer, for SINR values higher than 4.5 dB, the PRR is almost 0.99, and the goodput 3.05 Kbps, but the system performance is significantly degraded when the amount of interferers increases. Additionally, the energy efficiency associated with reactive strategies is superior to the constant attack strategy. Finally, based on the evaluated metrics and with the proposed experimental testbed, our findings offer a better understanding of jamming attacks on the sensor devices in real smart scenarios.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8231906PMC
http://dx.doi.org/10.3390/s21124079DOI Listing

Publication Analysis

Top Keywords

jamming attacks
20
experimental testbed
12
ieee 802154
8
system performance
8
performance
6
jamming
6
attacks
5
performance analysis
4
analysis ieee
4
802154 protocol
4

Similar Publications

The Internet of Things (IoT) contains many devices that can compute and communicate, creating large networks. Industrial Internet of Things (IIoT) represents a developed application of IoT, connecting with embedded technologies in production in industrial operational settings to offer sophisticated automation and real-time decisions. Still, IIoT compels significant cybersecurity threats beyond jamming and spoofing, which could ruin the critical infrastructure.

View Article and Find Full Text PDF

On Security Performance of SWIPT Multi-User Jamming Based on Mixed RF/FSO Systems with Untrusted Relay.

Sensors (Basel)

December 2024

Key Laboratory of Electromagnetic Wave Information Technology and Metrology of Zhejiang Province, College of Information Engineering, China Jiliang University, Hangzhou 310018, China.

This paper presents research on the security performance of a multi-user interference-based mixed RF/FSO system based on SWIPT untrusted relay. In this work, the RF and FSO channels experience Nakagami-m fading distribution and Málaga (M) turbulence, respectively. Multiple users transmit messages to the destination with the help of multiple cooperating relays, one of which may become an untrusted relay as an insider attacker.

View Article and Find Full Text PDF

XAI GNSS-A Comprehensive Study on Signal Quality Assessment of GNSS Disruptions Using Explainable AI Technique.

Sensors (Basel)

December 2024

LASSENA-Laboratory of Space Technologies, Embedded Systems, Navigation and Avionics, École de Technologie Supérieure (ETS), Montreal, QC H3C-1K3, Canada.

The hindering of Global Navigation Satellite Systems (GNSS) signal reception by jamming and spoofing attacks degrades the signal quality. Careful attention needs to be paid when post-processing the signal under these circumstances before feeding the signal into the GNSS receiver's post-processing stage. The identification of the time domain statistical attributes and the spectral domain characteristics play a vital role in analyzing the behaviour of the signal characteristics under various kinds of jamming attacks, spoofing attacks, and multipath scenarios.

View Article and Find Full Text PDF

Satellite Fingerprinting Methods for GNSS Spoofing Detection.

Sensors (Basel)

December 2024

Institute of Communications and Navigation, German Aerospace Center (DLR), 51147 Köln, Germany.

Spoofing attacks pose a significant security risk for organizations and systems relying on global navigation satellite systems (GNSS) for their operations. While the existing spoofing detection methods have shown some effectiveness, these can be vulnerable to certain attacks, such as secure code estimation and replay (SCER) attacks, among others.This paper analyzes the potential of satellite fingerprinting methods for GNSS spoofing detection and benchmarks their performance using real (in realistic scenarios by using GPS and Galileo signals generated and recorded in the advanced GNSS simulation facility of DLR) GNSS signals and scenarios.

View Article and Find Full Text PDF

Robust verification protocols are crucial for maintaining the security and reliability of sensitive information due to the increasing complexity of cyber-attacks. This paper introduces a novel 5G Secure Handover Protocol aimed at addressing security and effectiveness issues encountered in existing systems. The proposed protocol is robust against various attacks, including de-synchronization, replay, man-in-the-middle (MITM), denial of services (DoS), and jamming, ensures perfect forward key secrecy, safeguarding communication confidentiality.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!