ABSTRACT
In this work we focus on secure routing protocols in wireless sensor networks. Routing is a fundamental task in sensor networks and, consequently, attacks on the routing functionality can have a serious impact in the network performance. In order to deal with this problem we propose the application of an existing modelling framework for secure routing protocols which reflects the node capabilities. This framework describes an adversary model adapted to the capabilities of the sensor network. Our proposal is based on timed automata and the UPPAAL tool.
- A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuéllar, P. H. Drielsma, P.-C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications. In K. Etessami and S. K. Rajamani, editors, CAV, volume 3576 of Lecture Notes in Computer Science, pages 281--285. Springer, 2005. Google ScholarDigital Library
- G. Behrmann, A. David, and K. G. Larsen. A tutorial on Uppaal. In M. Bernardo and F. Corradini, editors, SFM, volume 3185 of Lecture Notes in Computer Science, pages 200--236. Springer, 2004.Google Scholar
- E. M. Clarke, O. Grumberg, and D. A. Peled. Model Checking. The MIT Press, 1999. Google ScholarDigital Library
- G. ács, L. Buttyán, and I. Vajda. The security proof of a link-state routing protocol for wireless sensor networks. In October, editor, In Proceedings of the 3rd IEEE Workshop on Wireless and Sensor Networks Security (WSNS 2007), Pisa, Italy, 2007. IEEE Press.Google Scholar
- C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In First IEEE International Workshop on Sensor Network Protocols and Applications, pages 113--127, May 2003.Google ScholarCross Ref
- K. G. Larsen, P. Pettersson, and W. Yi. Uppaal in a Nutshell. Int. Journal on Software Tools for Technology Transfer, 1(1-2):134--152, Oct. 1997.Google ScholarDigital Library
- G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(1-2):53--84, 1998. Google ScholarDigital Library
- A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar. SPINS: security protocols for sensor netowrks. In Mobile Computing and Networking, pages 189--199, 2002. Google ScholarDigital Library
Index Terms
- Modelling secure wireless sensor networks routing protocols with timed automata
Recommendations
Secure Coverage Tree Construction Scheme for Wireless Sensor Networks
In wireless sensor networks, nodes usually construct tree structure in any monitored area to enable data aggregation and to transmit aggregated data by multi-hopping through neighbors to a remote sink (BS) which results in significant energy savings. ...
Centralized and Clustered k-Coverage Protocols for Wireless Sensor Networks
Sensing coverage is an essential functionality of wireless sensor networks (WSNs). However, it is also well known that coverage alone in WSNs is not sufficient, and hence network connectivity should also be considered for the correct operation of WSNs. ...
Multi-factor and Distributed Clustering Routing Protocol in Wireless Sensor Networks
One of important issues in wireless sensor networks is how to effectively use the limited node energy to prolong the lifetime of the networks. Clustering is a promising approach in wireless sensor networks, which can increase the network lifetime and ...
Comments