R-TSCH: Proactive Jamming Attack Protection for IEEE 802.15.4-TSCH Networks

Dimitrios Zorbas, Panayiotis Kotzanikolaou, Christos Douligeris

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Time Slotted Channel Hopping (TSCH) has been proposed in various wireless protocols as a solution to combat external interference, path-loss fading and static jamming attacks. However, since TSCH algorithms generate a deterministic and periodic pattern of channel hops, they are still subject to jamming attacks. Proactive randomization of the channel generation process could provide a good solution against jamming attacks, however due to the strict time constraints of the timeslots, practical solutions should be very efficient. In this paper, we propose R-TSCH, a randomized radio channel generation algorithm that can be used to proactively protect wireless nodes from jamming attacks. Based on a cryptographic hash function and a secret key, R-TSCH produces a new pseudo-random channel sequence, which looks as truly random to anyone who has no access to the key. Our simulation results show that the attacked links of the TSCH network enhanced with the proposed mechanism can achieve an over 90% Packet Reception Rate (PRR) in presence of multiple jammers.

Original languageEnglish
Title of host publication2018 IEEE Symposium on Computers and Communications, ISCC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages766-771
Number of pages6
ISBN (Electronic)9781538669501
DOIs
Publication statusPublished - Nov 15 2018
Externally publishedYes
Event2018 IEEE Symposium on Computers and Communications, ISCC 2018 - Natal, Brazil
Duration: Jun 25 2018Jun 28 2018

Publication series

NameProceedings - IEEE Symposium on Computers and Communications
Volume2018-June
ISSN (Print)1530-1346

Conference

Conference2018 IEEE Symposium on Computers and Communications, ISCC 2018
Country/TerritoryBrazil
CityNatal
Period6/25/186/28/18

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • General Mathematics
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'R-TSCH: Proactive Jamming Attack Protection for IEEE 802.15.4-TSCH Networks'. Together they form a unique fingerprint.

Cite this