author={Marco Tiloca and Domenico De Guglielmo and Gianluca Dini and Giuseppe Anastasi and Sajal K. Das},
  journal={ACM Transactions on Sensor Networks (TOSN)},
  pages={1 - 28}
The MAC standard amendment IEEE 802.15.4e is designed to meet the requirements of industrial and critical applications. In particular, the Time Slotted Channel Hopping (TSCH) mode divides time into periodic, equally sized, slotframes composed of transmission timeslots. Then, it combines time slotted access with multichannel and channel hopping capabilities, providing large network capacity, high reliability, and predictable latency while ensuring energy efficiency. Since every network node… 

Figures and Tables from this paper

On the issues of selective jamming in IEEE 802.15.4-based wireless body area networks
A new efficient version of GTS attacks that benefits from both the standard behavior and the superframe effect on the periodic traffic to conserve the adversary’s resources for the longest period is introduced.
Cracking the channel hopping sequences in IEEE 802.15.4e-based industrial TSCH networks
This paper represents the first systematic study that investigates the security vulnerability of TSCH channel hopping in IEEE 802.15.4e under realistic traffic and shows that an attacker can reverse engineer the channel hopping sequences by silently observing the channel activities and put the network in Danger.
Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks
This article represents the first systematic study that investigates the security vulnerability of TSCH channel hopping and graph routing under realistic settings and demonstrates the cracking process, presents two case studies using publicly accessible implementations, and provides a set of insights.
Output-based Security Control of NCSs Under Resilient Event-triggered Mechanism and DoS Attacks
This paper studies the output-based security control of networked control systems under resilient event-triggered mechanism (RETM) and periodic denial-of-service (DoS) attacks, and establishes quantitative relationships among the RETM, DoS attacks, sampling period and exponential decay rate.
Output-based event-triggered resilient control of uncertain NCSs under DoS attacks and quantisation
Output-based resilient control of uncertain networked control systems under denial-of-service (DoS) attacks, resilient event-triggered mechanism (ETM) and quantisation, and co-design conditions are presented to compute parameters of the resilient ETM and DOF controller simultaneously.
“What Is This Love That Loves Us?”: Terrence Malick’s To the Wonder as a Phenomenology of Love
Terrence Malick’s To the Wonder (2013) considers the relationship of Divine Love with the individual soul, and its corresponding relationships to the other as neighbor. In this article, I analyze the
Diffuse Idiopathic Skeletal Hyperostosis: Persistent Sore Throat and Dysphagia in an Elderly Smoker Male
An 80-year-old chronic smoker male presented with 6-month history of sore throat and progressive dysphagia and agreed on a percutaneous endoscopic gastrostomy tube insertion for nutritional support and osteophytectomy was left to be discussed further.


A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks
This paper presents selective jamming resistant GTS, a solution against the GTS-based selectiveJamming attack, and shows that the solution is standard compliant and affordable for resource-scarce devices like Tmote Sky motes.
Short paper: reactive jamming in wireless networks: how realistic is the threat?
This work demonstrates that flexible and reliable software-defined reactive jamming is feasible by designing and implementing a reactive jammer against IEEE 802.15.4 networks and identifies the causes of loss at the physical layer of 802.
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
This work addresses the problem of control-channel jamming attacks in multi-channel ad hoc networks by considering a sophisticated adversary who exploits knowledge of the protocol mechanics along with cryptographic quantities extracted from compromised nodes to maximize the impact of his attack on higher-layer functions.
Channel surfing and spatial retreats: defenses against wireless denial of service
This paper presents two strategies that may be employed by wireless devices to evade a MAC/PHY-layer jamming-style wireless denial of service attack, and studies both of these strategies for three broad wireless communication scenarios: two-party radio communication, an infrastructured wireless network, and an ad hoc wireless network.
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
A Lightweight Authenticated ReKeying (LARK) scheme for clustered WSNs, which formally argues that it meets the backward and forward security requirements, and evaluates its performance in terms of communication, computing, and storage overhead in limited-resources sensor nodes.
The feasibility of launching and detecting jamming attacks in wireless networks
This paper proposes four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluates their effectiveness in terms of how each method affects the ability of a Wireless node to send and receive packets.
HISS: A HIghly Scalable Scheme for Group Rekeying
It is shown that it is possible to practically contrast or even prevent collusion attacks by properly allocating users to subgroups and prove the correctness of HISS, a highly scalable group rekeying scheme that efficiently rekeys the group into two broadcast re keying messages.
Towards a new paradigm for securing wireless sensor networks
The paper motivates a new paradigm where security is based upon using parameterized frequency hopping and cryptographic keys in a unified framework to provide differential security services for wireless sensor networks.
A survey of key management for secure group communication
The area of group key management is surveyed, proposed solutions are classified according to those characteristics, and an insight given to their features and goals.