首页 | 本学科首页   官方微博 | 高级检索  
     

信标模式下IEEE802.15.4网络漏洞分析及利用研究
摘    要:IEEE802.15.4因其低速率、低成本、低功耗和高质量特点,成为无线传感器网络MAC层标准,已被广泛应用于各种领域,其安全漏洞一旦被攻击者发现并利用将造成难以估量的后果。为发现当前协议标准中存在的问题,文章对IEEE802.15.4协议的MAC层标准进行了分析,发现了信标广播漏洞和GTS管理机制等漏洞,并给出了信标同步扰乱、阻止节点接入、空闲时隙抢占和空闲节点仿冒4种漏洞利用模式。漏洞及其利用模式的发现可为研究人员改进协议设计的安全性提供基本依据。

关 键 词:IEEE802.15.4;信标广播;GTS管理机制;漏洞利用

Analyzing and Exploiting Vulnerabilities of Beacon Enabled IEEE802.15.4 Networks
Abstract:With the characteristics of low rate, low cost, low power consumption and high quality, the IEEE802.15.4 standard became the MAC protocol for WSNs and has been widely used in various fields. The discovery and exploiting of vulnerabilities will cause inestimable consequences. To expose problems existed in protocol, the MAC standard of IEEE802.15.4 protocol was analyzed and vulnerabilities of beacon broadcasting and GTS management scheme were discovered. Based on that, four methods exploiting vulnerabilities were proposed, including beacon synchronization interference, denial of node access, free time slots occupying and idle node forgery. Analyzing and exploiting of vulnerabilities provide a fundamental basis for researchers to improve security of protocol design.
Keywords:IEEE802.15.4   beacon broadcasting   GTS management scheme   vulnerability exploiting
点击此处可从《信息工程大学学报》浏览原始摘要信息
点击此处可从《信息工程大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号