DOI QR코드

DOI QR Code

Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey

  • Hong, Sung-Hyuck (Office of International Affairs, Texas Tech University) ;
  • Lim, Sun-Ho (Department of Computer Science, Texas Tech University) ;
  • Song, Jae-Ki (Area of ISQS, Texas Tech University & Service Sciences Management & Engineering, Graduate School of Business, Sogang University)
  • Received : 2010.12.20
  • Accepted : 2011.03.05
  • Published : 2011.04.29

Abstract

Wireless Sensor Networks (WSNs) are rapidly emerging because of their potential applications available in military and civilian environments. Due to unattended and hostile deployment environments, shared wireless links, and inherent resource constraints, providing high level security services is challenging in WSNs. In this paper, we revisit various security attack models and analyze them by using a well-known standard notation, Unified Modeling Language (UML). We provide a set of UML collaboration diagram and sequence diagrams of attack models witnessed in different network layers: physical, data/link, network, and transport. The proposed UML-based analysis not only can facilitate understanding of attack strategies, but can also provide a deep insight into designing/developing countermeasures in WSNs.

Keywords

References

  1. S. Hadim and N. Mohamed, "Middleware: Middleware Challenges and Approaches for Wireless Sensor Networks," IEEE Computer Society, vol. 7, no. 3, pp. 1-23, Mar. 2006.
  2. C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, Sep. 2003. https://doi.org/10.1016/S1570-8705(03)00008-8
  3. L. Akyyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002. https://doi.org/10.1109/MCOM.2002.1024422
  4. Y. Wang, G. Attebury and B. Ramamurthy, "A Survey of Security Issues in Wireless Sensor Networks," IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, 2006.
  5. W. Xu, W. Trappe, Y. Zhang and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," in Proc. MobiHoc, pp. 46-57, 2005.
  6. D. R. Raymond and S. F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," Pervasive Computing, pp. 74-81, 2008.
  7. R. Kravets and P. Krishnan, "Power Management Techniques for Mobile Communication," in Proc. IEEE MOBICOM, pp. 157-168, 1998.
  8. T. Martin, M. Hsiao, D. Ha and J. Krishnaswami, "Denial-of-Service Attacks on Battery-powered Mobile Computers," in Proc. PerCom, pp. 309-318, 2004.
  9. D. Raymond, R. Marchany, M. Brownfield and S. Midkiff, "Effects of Denial of Sleep Attacks on Wireless Sensor Newtork MAC Protocols," in Proc. Workshop on Information Assurance, pp. 297-304, 2006.
  10. Anthony D. Wood and John A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer Society Press, vol. 35, no. 10, pp. 48-56, 2002.
  11. C. L. Schuba, I. V. Krsul, M. g. Kuhn, E. H. Spafford, A. Sundaram and D. Zamboni, "Analysis of a Denial of Service Attack on TCP," in Proc. IEEE Symposium on Security and Privacy, pp. 208-223, 1997.
  12. T. Aura, P. Nikander and J. Leiwo, "DOS-Resistant Authentication with Client Puzzles," in Proc. Security Protocols Workshop, pp. 170-177, 2000.
  13. L. Zhao, X. Zhao, Q. Long and Z. Yan, "A type system for the relational calculus of object systems," 11th IEEE International Conference on ICECCS 2006, pp.10. Sep. 2006.
  14. S.K. Jain and K. Garg, "A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks," Computational Intelligence, Communication Systems and Networks, 2009. CICSYN '09. First International Conference on, pp.102-107, Jul. 23-25, 2009.
  15. S. Cheung and K.N. Levitt, "Protecting Routing Infrastructures from Denial of Services Using Cooperative Intrusion Detection", in Proc. Workshop on New Security Paradigms, ACM Press, New York, pp. 94 - 106, 1997.
  16. Gutierrez, J.A.; Naeve, M., Callaway, E., Bourgeois, M., Mitter, V. and Heile, B., "IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks," Network, IEEE, vol. 15, no. 5, pp.12-19, Sep/Oct. 2001.
  17. Yih-Chun Hu; Perrig, A. and Johnson, D.B., "Wormhole attacks in wireless networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 370-380, Feb. 2006. https://doi.org/10.1109/JSAC.2005.861394

Cited by

  1. Robust Multihop Localization for Wireless Sensor Networks with Unreliable Beacons vol.8, pp.6, 2011, https://doi.org/10.1155/2012/972101
  2. Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach vol.66, pp.2, 2013, https://doi.org/10.1007/s11227-013-0965-0
  3. Research on Security Model and Requirements for Fog Computing: Survey vol.9, pp.5, 2011, https://doi.org/10.15207/jkcs.2018.9.5.027
  4. Fuzzy logic–based jamming detection algorithm for cluster‐based wireless sensor network vol.31, pp.10, 2011, https://doi.org/10.1002/dac.3567
  5. Private information protection method and countermeasures in Big-data environment: Survey vol.9, pp.10, 2011, https://doi.org/10.15207/jkcs.2018.9.10.055
  6. An adaptive neuro-fuzzy logic based jamming detection system in WSN vol.23, pp.8, 2011, https://doi.org/10.1007/s00500-018-3636-5
  7. Data-Centric UML Profile for Wireless Sensors : Application to Smart Farming vol.10, pp.2, 2011, https://doi.org/10.4018/ijaeis.2019040102