Performance analysis of the IEEE 802.15.4 protocol for smart environments under jamming attacks
Author
dc.contributor.author
López Vilos, Nicolás Alberto
Author
dc.contributor.author
Valencia Cordero, Claudio
Author
dc.contributor.author
Azurdia Meza, César Augusto
Author
dc.contributor.author
Montejo Sánchez, Samuel
Author
dc.contributor.author
Baraldi Mafra, Samuel
Admission date
dc.date.accessioned
2021-12-14T14:19:02Z
Available date
dc.date.available
2021-12-14T14:19:02Z
Publication date
dc.date.issued
2021
Cita de ítem
dc.identifier.citation
Sensors 2021, 21, 4079
es_ES
Identifier
dc.identifier.other
10.3390/s21124079
Identifier
dc.identifier.uri
https://repositorio.uchile.cl/handle/2250/183202
Abstract
dc.description.abstract
Jamming attacks in wireless sensor networks (WSNs) scenarios are detrimental to the
performance of these networks and affect the security and stability of the service perceived by users.
Therefore, the evaluation of the effectiveness of smart environment platforms based on WSNs has to
consider the system performance when data collection is executed under jamming attacks. In this
work, we propose an experimental testbed to analyze the performance of a WSN using the IEEE
802.15.4 CSMA/CA unslotted mode under jamming attacks in terms of goodput, packet receive rate
(PRR), and energy consumption to assess the risk for users and the network in the smart scenario.
The experimental results show that constant and reactive jamming strategies severely impact the
evaluated performance metrics and the variance’ of the received signal strength (RSS) for some signalto-
interference-plus-noise ratio (SINR) ranges. The measurements obtained using the experimental
testbed were correlated with analytical models. The results show that in the presence of one interferer,
for SINR values higher than 4.5 dB, the PRR is almost 0.99, and the goodput 3.05 Kbps, but the system
performance is significantly degraded when the amount of interferers increases. Additionally, the
energy efficiency associated with reactive strategies is superior to the constant attack strategy. Finally,
based on the evaluated metrics and with the proposed experimental testbed, our findings offer a
better understanding of jamming attacks on the sensor devices in real smart scenarios.
es_ES
Patrocinador
dc.description.sponsorship
Vicerrectoria de Investigacion, Desarrollo e Innovacion, Universidad de Santiago de Chile through the Project Dicyt Regular 061913VC
es_ES
Lenguage
dc.language.iso
en
es_ES
Publisher
dc.publisher
MDPI
es_ES
Type of license
dc.rights
Attribution-NonCommercial-NoDerivs 3.0 United States