Abstract
The increasing complexity of current wireless sensor networks requires efficient methodologies to fulfill the strict constraints typically imposed in terms of power consumption and system performance. Furthermore, security issues are also becoming key features due to their impact on system behavior. As a consequence, new design frameworks are required to enable developers to model and address security risks from the very beginning of the WSN design process, while optimizing system performance. For this purpose, this article presents a design framework for modeling and simulating WSNs under external attacks. In this framework, the WSN is specified by using UML/MARTE models, from which automatic code generation enables fast, host-compiled simulation. The resulting information enables early detection of weaknesses in WSN designs and simplifies further exploration of design solutions. Minor modifications in the UML models are sufficient to automatically simulate and evaluate each design alternative in an iterative way. As a result, designers can develop more secure and optimized WSN systems with reduced design times and effort.
Supplemental Material
Available for Download
Supplemental movie, appendix, image and software files for, High-Level Design of Wireless Sensor Networks for Performance Optimization Under Security Hazards
- Libelium. 50 Sensor Applications for a Smarter World. Retrieved from http://www.libelium.com/top_50_iot_sensor_applications_ranking.Google Scholar
- Y. Wang, G. Attebury, and B. Ramamurthy. 2006. A survey of security issues in wireless sensor networks. IEEE Communications Surveys 8 Tutorials, 8, 2.Google Scholar
- Object Management Group. 2003. MDA Guide Version 1.0.1. OMG Document Number omg/2003-06-01. Retrieved from http://www.omg.org/news/meetings/workshops/UML_2003_Manual/00-2_MDA_Guide_v1.0.1.pdf.Google Scholar
- OMG. 2017. Unified Modelling LanguageTM. Retrieved from http://www.omg.org/spec/UML/.Google Scholar
- Y. Vanderperren, W. Mueller, and W. Dehaene. 2008. UML for electronic systems design: A comprehensive overview, Design Automation for Embedded Systems, 12, 4, December 2008. Google ScholarDigital Library
- L. Lavagno, G. Martin, and B. Selic. 2003. UML for Real: Design of Embedded Real-Time Systems. Kluwer. Google ScholarCross Ref
- Object Management Group, UML Profile for MARTE: Modeling and Analysis of Real-Time Embedded Systems, version 1.1, OMG document: formal/2011-06-02, 2011.Google Scholar
- E. Ebeid, J. Medina, D. Quaglia, and F. Fummi. 2015. Extensions to the UML profile for MARTE for distributed embedded systems. In Proceedings of the Forum on Specification and Design Languages (FDL’2015). Google ScholarCross Ref
- D. Harel, H. Kugler, and A. Pnueli. 2005. Synthesis revisited: Generating statechart models from scenario-based requirements. In Formal Methods in Software and System Modeling.Google Scholar
- M. Adamski. 2009. Design of reconfigurable logic controllers from hierarchical UML state machines. In Proceedings of the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA’09). Google ScholarCross Ref
- W. Mueller, A. Rosti, S. Bocchio, E. Riccobene, P. Scandurra, W. Dehaene, and Y. Vanderperren. 2006. UML for ESL design -- Basic principals, tools, and applications. In Proceedings of the 2006 IEEE/ACM International Conference on Computer-Aided Design. Google ScholarCross Ref
- E. Piel, R. B. Atitallah, P. Marquet, S. Meftali, S. Niar, A. Etien, J. L. Dekeyser, and P. Boulet. 2008. Gaspard2: From MARTE to systemic simulation. In Proceedings of the Design, Automation and Test in Europe (DATE 08).Google Scholar
- J. L. Dekeyser, A. Gamatié, A. Etien, R. B. Atitallah, and P. Boulet. 2008. Using the UML profile for MARTE to MPSoC Co-Design. In Proceedings of the 1st International Conference on Embedded Systems 8 Critical Applications (ICESCA’08).Google Scholar
- I. R. Quadri, Yu Huafeng, A. Gamatie, E. Rutten, S. Meftali, and J.-L. Dekeyser. 2010. Targeting reconfigurable FPGA based SoCs using the UML MARTE profile: From high abstraction levels to code generation. International Journal of Embedded Systems, 4, 3--4, 204--24, 2010.Google ScholarCross Ref
- J. Vidal, F. de Lamotte, G. Gogniat, P. Soulard, and J. P. Diguet. 2009. A code-design approach for embedded system modelling and code generation with UML and MARTE. In Proceedings of DATE’09 (Dresden. Germany, Mar.), 2009.Google Scholar
- F. Herrera, H. Posadas, P. Peñil, E. Villar, F. Ferrero and R. Valencia. 2014. The COMPLEX methodology for UML/MARTE modeling and design-space exploration of embedded systems. Journal of System Architecture, 60, 1, 55--78. Google ScholarDigital Library
- Giovanni Saggio, Pietro Cavallo, Luigi Bianchi, Lucia R. Quitadamo, and Franco Giannini. 2009. UML model applied as a useful tool for wireless body area networks. Wireless Communication, Vehicular Technology, Information Theory and Aerospace 8 Electronic Systems Technology, 2009.Google Scholar
- Luca Berardinelli, Vittorio Cortellessa, and Stefano Pace. 2011. Modeling and analyzing performance of software for wireless sensor networks. In Proceedings of 2nd International Workshop on Software Engineering for Sensor Network Applications (SESENA’11). Google ScholarDigital Library
- E. Ebeid, D. Quaglia, and F. Fummi. 2012. Generation of systemC/TLM code from UML/MARTE sequence diagrams for verification. In Proceedings of the 2012 IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits 8 Systems (DDECS’12). Google ScholarCross Ref
- Marcello Mura and Maria Giovanna Sami. 2008. Code generation from statecharts: Simulation of wireless sensor networks digital system design architectures. In Proceedings of the 2008 11th EUROMICRO Conference on Digital System Design Architectures, Methods and Tools (DSD’08).Google ScholarDigital Library
- Sunghyuck Hong and Sunho Lim. 2010. Analysis of attack models via unified modeling language in wireless sensor networks: A survey study. In Proceedings of the 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS).Google Scholar
- E. Ebeid, F. Fummi, and D. Quaglia. 2013. UML-based modeling and simulation of environmental effects in networked embedded systems. In Proceedings of the 16th Euromicro Conference on Digital System Design (DSD’13). 787. Google ScholarDigital Library
- E. Ebeid, F. Fummi, D. Quaglia, H. Posadash, and E. Villar. 2014. A framework for design space exploration and performance analysis of networked embedded systems. In Proceedings of the 6th Workshop on Rapid Simulation and Performance Evaluation: Methods and Tools (RAPIDO’14). ACM, New York, NY, USA, Article 2, 8 pages. Google ScholarDigital Library
- J. Jürjens. 2002. UMLsec: Extending UML for secure systems development. In Proceedings of the 5th International Conference on Unified Modeling Language. Model Engineering, Concepts, and Tools. Lecture Notes in Computer Science, vol. 2460. Springer, Berlin, 412--425.Google Scholar
- J. Jurjens, and J. Fox. 2006. Tools for model-based security engineering. In Proceedings of the 28th International Conference on Software Engineering. 819--822. Google ScholarDigital Library
- J. Jürjens. 2008. Model-based security analysis for mobile communications. In Proceedings of the 2008 ACM/IEEE 30th International Conference on Software Engineering (ICSE’08). 683--692. Google ScholarDigital Library
- J. Jürjens. 2011. Automated security hardening for evolving UML models. In Proceedings of the 2011 33rd International Conference on Software Engineering (ICSE’11). 986--988. Google ScholarDigital Library
- Murray Woodside, Dorina C. Petriu, Dorin B. Petriu, Jing Xu, Tauseef Israr, Geri Georg, Robert France, James M. Bieman, Siv Hilde Houmb, and Jan Jürjens. 2009. Performance analysis of security aspects by weaving scenarios extracted from UML models. Journal of Systems and Software 82, 1, 56--74. Google ScholarDigital Library
- M. Gligor, N. Fournel, and F. Pétrot. 2009. Using binary translation in event driven simulation for fast and flexible MPSoC simulation. In Proceedings of CODES+ISSS’09. ACM. Google ScholarDigital Library
- P. Botella, P. S´nchez, and H. Posadas. 2010. Automatic generation of systemc SMP Models for HW/SW co-simulation. In Proceedings of the XXV Conference on Design of Circuits and Integrated Systems (DCIS’10).Google Scholar
- P. Gerin, M. Hamayun, and F. Petrot. 2009. Native MPSoC co-simulation environment for software performance estimation. In Proceedings of CODES+ISSS’09. ACM. Google ScholarDigital Library
- M. Mekni and B. Moulin. 2008. A survey on sensor webs simulation tools. In Proceedings of the 2008 2nd International Conference on Sensor Technologies and Applications. 574--579. Google ScholarDigital Library
- Andriy Stetsko, Martin Stehl&icute;k, and Vashek Matyas. 2011. Calibrating and comparing simulators for wireless sensor networks. In MASSIEEE. 733--738.Google Scholar
- D. Curren. 2005. A survey of simulation in sensor networks. University of Binghamton project report for subject CS580.Google Scholar
- H. L. Harsh Sundani, Vijay K. Devabhaktuni, Mansoor Alam, and Prabir Bhattacharya. 2010. Wireless sensor network simulators a survey and comparisons. International Journal of Computer Networks (IJCN) 2, 2010.Google Scholar
- Contiki. 2017. Contiki: The Open Source OS for the Internet of Things. Retrieved from http://www.contiki-os.org/.Google Scholar
- A. Boulis. 2007. Demo abstract: Castalia: Revealing pitfalls in designing distributed algorithms in WSN. In Proceedings of the 5th ACM Conference on Embedded Networked Sensor Systems. 407--408.Google Scholar
- NS-2. 2007. The Network Simulator. Retrieved from https://www.isi.edu/nsnam/ns/.Google Scholar
- NS-3. 2015. Homepage. Retrieved from http://www.nsnam.org/.Google Scholar
- OMNeT++. 2012. Homepage.Retrieved from www.omnetpp.org.Google Scholar
- X. Zeng, R. Bagrodia, and M. Gerla. 1998. GloMoSim: A library for parallel simulation of large-scale wireless networks. In Proceedings of the 12th Workshop on Parallel and Distributed Simulation. Google ScholarDigital Library
- Philip Levis, Nelson Lee, Matt Welsh, and David Culler. 2003. TOSSIM: Accurate and scalable simulation of entire TinyOS applications. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. Los Angeles, California, USA. Google ScholarDigital Library
- B. L. Titzer, J. Palsberg, and D. K. Lee. 2005. Avrora: Scalable sensor network simulation with precise timing. In Proceedings of the 4th International Conference on Information Processing in Sensor Networks. Google ScholarCross Ref
- R. Bagrodia, R. Meyer, M. Takai, Yu-An Chen, Xiang Zeng, J. Martin, and Ha Yoon Song. 1998. Parsec: A parallel simulation environment for complex systems. In Computer 31, 10 (Oct. 1998), 77--85.Google ScholarDigital Library
- TinyOS. 2012. Homepage. Retrieved from http://www.tinyos.net.Google Scholar
- Peng Lei1 and Zeng Jiazhi. 2007. WSM: Introduction, design and case study. In Wireless Communications, Networking and Mobile Computing (WiCom 2007).Google Scholar
- A. Sobeih, J. C. Hou, L.-C. Kung, N. Li, H. Zhang, W.-P. Chen, H.-Y. Tyan, and H. Lim. 2006. J-Sim: A simulation and emulation environment for wireless sensor networks. IEEE Wireless Communications 13, 4, 104--119. Google ScholarDigital Library
- S. Dhurandher, S. Misra, M. Obaidat, and S. Khairwal. 2008. UWSim: A simulator for underwater sensor networks. Simulation 84, 7, 327--338. Google ScholarDigital Library
- S. P. Fekete, A. Kroller, S. Fischer, and D. Pfisterer. 2007. Shawn: The fast, highly customizable sensor network simulator. In Proceedings of the 4th International Conference on Networked Sensing Systems (INSS 2007). Google ScholarCross Ref
- G. Simon, P. Volgyesi, M. Maroti, and A. Ledeczi. 2003. Simulation-based optimization of communication protocols for large-scale wireless sensor networks. In Proceedings of the IEEE Aerospace Conference. Google ScholarCross Ref
- Institute for Software Intergrated System. 2015 Jprowler. Retrieved from http://www.isis.vanderbilt.edu/Projects/nest/jprowler/.Google Scholar
- J. Polley, D. Blazakis, J. McGee, D. Rusk, J. S. Baras, and M. Karir. 2004. ATEMU: A fine-grained sensor network simulator. In Proceedings of the 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks. Google ScholarCross Ref
- Papyrus. 2015. Homepage. Retrieved from http://www.papyrusuml.org/.Google Scholar
- MOF Model to Text Transformation Language, v1.0. 2008. OMG Document Number: formal/2008-01-16. http://www.omg.org/spec/MOFM2T/1.0/PDF.Google Scholar
- Acceleo. 2010. Homepage. Retrieved from http://www.acceleo.org.Google Scholar
- Freertos. 2014. Homepage. Retrieved from http://www.freertos.org.Google Scholar
- R. P. Torres, L. Valle, M. Domingo, S. Loredo, and M. C. Diez. 1999. CINDOOR: An engineering tool for planning and design of wireless systems in enclosed spaces. IEEE Antennas and Propagation Magazine 41, 4, 11--21 Google ScholarCross Ref
- Shahriar Mohammadi and Hossein Jadidoleslamy. 2011. A comparison of link layer attacks on wireless sensor networks. International Journal on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks (GRAPH-HOC) 3, 1 (March 2011). DOI:10.5121/jgraphhoc.2011.3103 Google ScholarCross Ref
- Prabhudutta Mohanty, Sangram Panigrahi, Nityananda Sarma, and Siddhartha Sankar Satapathy. 2010. Security issues in wireless sensor network data gathering protocols: A survey. Journal of Theoretical and Applied Information Technology 13, 14--27.Google Scholar
- K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy. 2011. Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys and Tutorials 13, 2, 245--257. Google ScholarCross Ref
- P. Reindl, K. Nygard, and D. Xiaojiang. 2010. Defending malicious collision attacks in wireless sensor networks. IEEE/IFIP Conference on Embedded and Ubiquitous Computing (EUC). Google ScholarDigital Library
- A. D. Wood and J. A. Stankovic. 2004. A taxonomy for denial-of-service attacks in wireless sensor networks, Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems.Google Scholar
- Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, and Kendall Nygard. 2003. Prevention of cooperative black hole attack in wireless ad hoc networks. In Proceedings of the International Conference on Wireless Networks.Google Scholar
- Jing Deng, Richard Han, and Shivakant Mishra. 2005. Defending against path-based DoS attacks in wireless sensor networks. In Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’05). ACM, New York, NY, USA, 89--96. DOI:http://dx.doi.org/10.1145/1102219.1102235 Google ScholarDigital Library
- M. Yasir. 2012. An outline of security in wireless sensor networks threats, Ccountermeasures and implementations. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management Book. 507--527.Google Scholar
- Yuanyuan Zhang and Marine Minier. 2012. Selective forwarding attacks against data and ACK flows in network coding and countermeasures. Journal of Computer Networks and Communications 2012, Article ID 184783, 14 pages. DOI:10.1155/2012/184783 Google ScholarCross Ref
- Akhil Dubey, Vaishali Jain, and Ashwani Kumar. 2014. A survey in energy drain attacks and their countermeasures in wireless sensor networks. International Journal of Engineering Research 8 Technology 3--2 (February 2014).Google Scholar
- Virendra Pal Singh, Sweta Jain, and Jyoti Singhai. 2010. Hello Flood attack and its countermeasures in wireless sensor networks. International Journal of Computer Science Issues (IJCSI) 7, 3, 11.Google Scholar
- M. Y. Abdullah and N. Alsharabi. 2008. Wireless sensor networks misdirection attacker challenges and solutions. In Proceedings of the IEEE International Conference of Automation (ICIA).Google Scholar
- Akhil Dubey, Deepak Meena, and Shaili Gaur. 2014. A survey in hello flood attack in wireless sensor networks. International Journal of Engineering Research 8 Technology 3, 1 (January 2014).Google Scholar
- I. Krontiris, T. Giannetsos, and T. Dimitriou. 2008. Launching a sinkhole attack in wireless sensor networks; the intruder side, In Proceedings of the 2008 IEEE International Conference on Wireless 8 Mobile Computing, Networking 8 Communication. IEEE Computer Society, Washington, DC, 526--53Google Scholar
- V. Bharath Srinivas and Syed Umar. 2013. Spoofing attacks in wireless sensor networks. IJCSET 3, 6, 201--210.Google Scholar
- James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. 2004. The Sybil attack in sensor networks: Analysis 8 defenses, In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks. Google ScholarDigital Library
- Haafizah Rameeza Shaukat, Fazirulhisyam Hashim, Aduwati Sali, and M. Fadlee Abdul Rasid. 2014. Node replication attacks in mobile wireless sensor network: A survey. International Journal of Distributed sensor Networks 2014ID 402541, 15 pages.Google Scholar
- T. Kavitha and D. Sridharan. 2010. Security vulnerabilities in wireless sensor networks: A survey. Journal of Information Assurance and Security 5, 31--44.Google Scholar
- http://ftp1.digi.com/support/documentation/90000976_C.pdf.Google Scholar
- H. Posadas, P. Peñil, A. Nicol´s, and E. Villar. 2014. Automatic synthesis of embedded SW for evaluating physical implementation alternatives from UML/MARTE models supporting memory space separation. Microelectronics Journal 45, 10 (Oct. 2014), 1281--1291. DOI:10.1016/j.mejo.2013.11.003 Google ScholarCross Ref
- H. Posadas, J. Castillo, D. Quijano, V. Fernandez, E. Villar, and M. Martinez. 2010. System platform modeling for behavioral simulation and performance estimation of embedded systems. In L. Gomes, 8 J. Fernandes (Eds.), Behavioral Modeling for Embedded Systems and Technologies: Applications for Design and Implementation. 219--243. Google ScholarCross Ref
- Alvaro Diaz, Raul Diego, and Pablo Sanchez. 2012. Virtual platform for wireless sensor networks. In Proceedings of the 2012 15th Euromicro Conference on Digital System Design. 858--865. Google ScholarDigital Library
Index Terms
- High-Level Design of Wireless Sensor Networks for Performance Optimization Under Security Hazards
Recommendations
The optimization of sensor relocation in wireless mobile sensor networks
Wireless Sensor Networks (WSNs) have been an active research area these years due to their broad range of potential applications. Several research issues, which include energy-aware routing, sensor deployment problems, data aggregation, etc., have been ...
Relay Node Placement in Wireless Sensor Networks
A wireless sensor network consists of many low-cost, low-power sensor nodes, which can perform sensing, simple computation, and transmission of sensed information. Long distance transmission by sensor nodes is not energy efficient since energy ...
Sensor scheduling for p-percent coverage in wireless sensor networks
We study sensor scheduling problems of p-percent coverage in this paper and propose two scheduling algorithms to prolong network lifetime due to the fact that for some applications full coverage is not necessary and different subareas of the monitored ...
Comments