| Literature DB >> 22319358 |
Shahnaz Saleem1, Sana Ullah, Kyung Sup Kwak.
Abstract
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.Entities:
Keywords: IEEE 802.15.4; WBAN; attacks; security
Mesh:
Year: 2011 PMID: 22319358 PMCID: PMC3274043 DOI: 10.3390/s110201383
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.WBAN architecture for medical applications.
WBAN OSI layers and DoS attacks/denfeses.
| Physical | Jamming | Spread-spectrum, priority messages, lower duty cycle, region mapping, mode change |
| Tampering | Tamper-proof, hiding | |
| Link | Collision | Error correcting code |
| Unfairness | Small frames | |
| Exhaustion | Rate limitation | |
| Network | Neglect and greed | Redundancy, probing |
| Homing | Encryption | |
| Misdirection | Egress filtering, authorization monitoring | |
| Black holes | Authorization, monitoring, redundancy | |
| Transport | Flooding | Client Puzzles |
| De-synchronization | Authentication | |
Figure 2.IEEE 802.15.4 superframe structure.
Security modes in IEEE 802.15.4.
| Null | No security | ||||
| AES-CTR | Encryption only, CTR Mode | X | X | X | |
| AES-CBC- | 128 bit | X | X | ||
| AES-CBC- | 64 bit | X | X | ||
| AES-CBC- | 32 bit | X | X | ||
| AES-CCM-128 | Encryption & 128 bit | X | X | X | X |
| AES-CCM-64 | Encryption & 64 bit | X | X | X | X |
| AES-CCM-32 | Encryption & 32 bit | X | X | X | X |
Figure 3.(a) GTS allocation process, (b) GTS deallocation process.
Figure 4.(a) Backoff manipulation attack on the CAP, (b) Attack on CFP period.
Figure 5.Probability of failed GTS requests.
Figure 6.Total number of corrupted slots in the CFP.
Figure 7.Decrease in bandwidth utilization.