Behavioural Modelling of WSN MAC Layer Security Attacks: A Sequential UML Approach

Authors

  • Pranav M. Pawar Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark
  • Rasmus H. Nielsen Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark
  • Neeli R. Prasad Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark
  • Shingo Ohmori Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark
  • Ramjee Prasad Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark

DOI:

https://doi.org/10.13052/jcsm2245-1439.115

Keywords:

wireless sensor networks (WSNs), media access control (MAC), unified modelling language (UML), security and attacks

Abstract

Wireless sensor networks (WSNs) are growing enormously and becoming increasingly attractive for a variety of application areas such as tele-health monitoring, industry monitoring, home automation and many more. The primary weakness shared by all wireless application and technologies is the vulnerability to security attacks/threats. The performance and behaviour of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behaviour of the attacks. This paper addresses the behavioural modelling of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays. The behavioural modelling of attacks will be beneficial for designing efficient and secureMAClayer protocols. The security attacks are modelled using a sequential diagram approach of Unified Modelling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed.

Downloads

Download data is not yet available.

Author Biographies

Pranav M. Pawar, Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark

Pranav M. Pawar graduated in Computer Engineering from Dr. BabasahebAmbedkar Technological University, Maharashtra, India, in 2005 and received Master in Computer Engineering from Pune Universiry, in 2007. From 2006 to 2007, was working as System Executive in POS-IPC, Pune, India. From Jan 2008, he is working as an Assistant Professor in Department of Information Technology, STES’s Smt. KashibaiNavale College of Engineering, Pune. Currently he is working towards his Ph.D. in Wireless Communication from Aalborg University, Denmark. He published 17 papers at national and international level. He is IBM DB2 and IBM RAD certified professional. His research interests are Energy efficient MAC for WSN, QoS in WSN, wireless security, green technology, computer architecture, database management system and bioinformatics.

Rasmus H. Nielsen, Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark

Rasmus Hjorth Nielsen is an assistant professor at Center for TeleInFrastruktur (CTIF) at Aalborg University (AAU), Denmark and is currently working as a senior researcher at CTIF-USA, Princeton, USA. He received his M.Sc. and Ph.D. in electrical engineering from Aalborg University in 2005 and 2009 respectively. He has been working on a number of EU- and industrial funded projects primarily within the field of next generation networks where his focus is currently security and performance optimization. He has a strong background in operational research and optimization in general and has applied this as a consultant within planning of large-scale networks. His research interests include IoT, WSNs, virtualization and other topics related to next generation converged wired and wireless networks.

Neeli R. Prasad, Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark

Neeli Rashmi Prasad, Ph.D., IEEE Senior Member, Head of Research and Coordinator of Themantic area Network without Borders, Center for TeleInfrastruktur (CTIF), Aalborg University, Aalborg, Denmark. Director of CTIF-USA, Princeton, USA and leading IoT Testbed at Easy Life Lab and Secure Cognitive radio network testbed at S-Cogito Lab. She received her Ph.D. from University of Rome “Tor Vergata”, Rome, Italy, in the field of “adaptive security for wireless heterogeneous networks” in 2004 and M.Sc. (Ir.) degree in Electrical Engineering from Delft University of Technology, The Netherlands, in the field of “Indoor Wireless Communications using Slotted ISMA Protocols” in 1997. During her industrial and academic career for over 14 years, she has lead and coordinated several projects. At present, She is leading a industry-funded projects on Security and Monitoring (STRONG) and on reliable self organizing networks REASON, Project Coordinator of European Commission (EC) CIP-PSP LIFE 2.0 for 65+ and social interaction and Integrated Project (IP) ASPIRE on RFID and Middleware and EC Network of Excellence CRUISE on Wireless Sensor Networks. She is co-caretaker of real world internet (RWI) at Future Internet. She has lead EC Cluster for Mesh and Sensor Networks and Counsellor of IEEE Student Branch, Aalborg. She is Aalborg University project leader for EC funded IST IP e-SENSE on Wireless Sensor Networks and NI2S3 on Homeland and Airport security and ISISEMD on telehealth care. She is also part of the EC SMART Cities workgroup portfolio. She joined Libertel (now Vodafone NL), Maastricht, The Netherlands as a Radio Engineer in 1997. From November 1998 till May 2001, she worked as Systems Architect for Wireless LANs in Wireless Communications and Networking Division of Lucent Technologies, Nieuwegein, The Netherlands. From June 2001 to July 2003, she was with T-Mobile Netherlands, The Hague, The Netherlands as Senior Architect for Core Network Group. Subsequently, from July 2003 to April 2004, she was Senior Research Manager at PCOM:I3, Aalborg, Denmark. Her publications range from top journals, international conferences and chapters in books. She has also co-edited and co-authored two books titled “WLAN Systems and Wireless IP for Next Generation Communications” and “Wireless LANs and Wireless IP Security, Mobility, QoS and Mobile Network Integration”, published by Artech House, 2001 and 2005. Her research interests lie in the area of Security, Privacy and Trust, Management or Wireless and wired networks and Energy-efficient Routing.

References

Xiangqian Chen, Kia Makki, Kang Yen, and NikiPissinou. Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11(2): 52–73, Second Quarter 2009.

Javier Lopez, Rodrigo Roman, and Cristina Alcaraz. Analysis of Security Threats, Requirements, Technologies and Standards inWireless Sensor Networks. Springer-Verlag Berlin Heidelberg, pp. 289–338, 2009.

AbdelmalikBachir, MischaDohler, ThomasWatteyne, Kin K. Leung.MAC essentials for wireless sensor networks. IEEE Communications Surveys & Tutorials, 12(2):222–248, Second Quarter 2010.

Tom Peder. UML Bible. John Wiley & Sons, First Edition, 2003.

Sunghyuck Hong and Sunho Lim. Analysis of attack models via unified modelling language in wireless sensor networks: A survey study. WCNIS, pp. 692–696, 25–27 Jan 2010.

Pranav M. Pawar, Rasmus H. Nielsen, Neeli R. Prasad, Shingo Ohmori, and Ramjee Prasad. Hybrid Mechanisms: Towards an Efficient Wireless Sensor Network Medium Access Control, WPMC, 3–6 October 2011, Brest, France.

Injong Rhee, AjitWarrier, Mahesh Aia, Jeongki Min, and Mihail L. Sichitiu, ZMAC: A hybrid MAC for wireless sensor networks, IEEE/ACM Transactions On Networking, 16(3):511–524, June 2008.

P. Reindl, K. Nygard, and Du Xiaojiang, Defending malicious collision attacks in wireless sensor networks, EUC, pp.

–776, 11–13 Dec 2010.

QingchunRen, Qilian Liang, Secure Media Access Control (MAC) in Wireless Sensor Network: Intrusion Detections and Countermeasures, PIMRC 2004, 3025–3029.

David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff. Effects of denial-of-sleep attacks on wireless sensor networkMACprotocols. IEEE Transaction on Vehicular Technology, 58(1):367–380, January 2009.

Yee Wei Law, Marimuthu Palaniswami, Lodewijk Van Hoesel, JeroenDoumen, Pieter Hartel, and Paul Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Transactions on Sensor Networks, 5(1):6.1–6.38, Feb 2009.

Yanli Yu, KeqiuLi,WanleiZhou, PingLi. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, March 2011.

Michael Brownfield, Yatharth Gupta, and Nathaniel Davis IV. Wireless sensor network denial of sleep attack. In Proceedings of the 2005 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, pp. 356–364.

Downloads

Published

2012-01-10

How to Cite

1.
Pawar PM, Nielsen RH, Prasad NR, Ohmori S, Prasad R. Behavioural Modelling of WSN MAC Layer Security Attacks: A Sequential UML Approach. JCSANDM [Internet]. 2012 Jan. 10 [cited 2024 Nov. 4];1(1):65-82. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/6069

Issue

Section

Articles

Most read articles by the same author(s)