@Article{Jung2014, author="Jung, Sang Shin and Valero, Marco and Bourgeois, Anu and Beyah, Raheem", title="Attacking and securing beacon-enabled 802.15.4 networks", journal="Wireless Networks", year="2014", volume="21", number="5", pages="1517--1535", abstract="The IEEE 802.15.4 standard has attracted time-critical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme's security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beacon-enabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for wireless sensor nodes, where the malicious node is deployed as an inside attacker. We show that the malicious node can freely exploit information retrieved from the beacon frames to compromise the integrity and availability of the network. To defend against these attacks, we present BCN-Sec, a protocol that ensures the integrity of data and control frames in beacon-enabled 802.15.4 networks. We implement BCN-Sec, and show its efficacy during various attacks.", issn="1572-8196", doi="10.1007/s11276-014-0855-2", url="http://dx.doi.org/10.1007/s11276-014-0855-2" }