Behavioural Modelling of WSN MAC Layer Security Attacks: A Sequential UML Approach
DOI:
https://doi.org/10.13052/jcsm2245-1439.115Keywords:
wireless sensor networks (WSNs), media access control (MAC), unified modelling language (UML), security and attacksAbstract
Wireless sensor networks (WSNs) are growing enormously and becoming increasingly attractive for a variety of application areas such as tele-health monitoring, industry monitoring, home automation and many more. The primary weakness shared by all wireless application and technologies is the vulnerability to security attacks/threats. The performance and behaviour of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behaviour of the attacks. This paper addresses the behavioural modelling of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays. The behavioural modelling of attacks will be beneficial for designing efficient and secureMAClayer protocols. The security attacks are modelled using a sequential diagram approach of Unified Modelling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed.
Downloads
References
Xiangqian Chen, Kia Makki, Kang Yen, and NikiPissinou. Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11(2): 52–73, Second Quarter 2009.
Javier Lopez, Rodrigo Roman, and Cristina Alcaraz. Analysis of Security Threats, Requirements, Technologies and Standards inWireless Sensor Networks. Springer-Verlag Berlin Heidelberg, pp. 289–338, 2009.
AbdelmalikBachir, MischaDohler, ThomasWatteyne, Kin K. Leung.MAC essentials for wireless sensor networks. IEEE Communications Surveys & Tutorials, 12(2):222–248, Second Quarter 2010.
Tom Peder. UML Bible. John Wiley & Sons, First Edition, 2003.
Sunghyuck Hong and Sunho Lim. Analysis of attack models via unified modelling language in wireless sensor networks: A survey study. WCNIS, pp. 692–696, 25–27 Jan 2010.
Pranav M. Pawar, Rasmus H. Nielsen, Neeli R. Prasad, Shingo Ohmori, and Ramjee Prasad. Hybrid Mechanisms: Towards an Efficient Wireless Sensor Network Medium Access Control, WPMC, 3–6 October 2011, Brest, France.
Injong Rhee, AjitWarrier, Mahesh Aia, Jeongki Min, and Mihail L. Sichitiu, ZMAC: A hybrid MAC for wireless sensor networks, IEEE/ACM Transactions On Networking, 16(3):511–524, June 2008.
P. Reindl, K. Nygard, and Du Xiaojiang, Defending malicious collision attacks in wireless sensor networks, EUC, pp.
–776, 11–13 Dec 2010.
QingchunRen, Qilian Liang, Secure Media Access Control (MAC) in Wireless Sensor Network: Intrusion Detections and Countermeasures, PIMRC 2004, 3025–3029.
David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff. Effects of denial-of-sleep attacks on wireless sensor networkMACprotocols. IEEE Transaction on Vehicular Technology, 58(1):367–380, January 2009.
Yee Wei Law, Marimuthu Palaniswami, Lodewijk Van Hoesel, JeroenDoumen, Pieter Hartel, and Paul Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Transactions on Sensor Networks, 5(1):6.1–6.38, Feb 2009.
Yanli Yu, KeqiuLi,WanleiZhou, PingLi. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, March 2011.
Michael Brownfield, Yatharth Gupta, and Nathaniel Davis IV. Wireless sensor network denial of sleep attack. In Proceedings of the 2005 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, pp. 356–364.