skip to main content
research-article

High-Level Design of Wireless Sensor Networks for Performance Optimization Under Security Hazards

Authors Info & Claims
Published:01 August 2017Publication History
Skip Abstract Section

Abstract

The increasing complexity of current wireless sensor networks requires efficient methodologies to fulfill the strict constraints typically imposed in terms of power consumption and system performance. Furthermore, security issues are also becoming key features due to their impact on system behavior. As a consequence, new design frameworks are required to enable developers to model and address security risks from the very beginning of the WSN design process, while optimizing system performance. For this purpose, this article presents a design framework for modeling and simulating WSNs under external attacks. In this framework, the WSN is specified by using UML/MARTE models, from which automatic code generation enables fast, host-compiled simulation. The resulting information enables early detection of weaknesses in WSN designs and simplifies further exploration of design solutions. Minor modifications in the UML models are sufficient to automatically simulate and evaluate each design alternative in an iterative way. As a result, designers can develop more secure and optimized WSN systems with reduced design times and effort.

Skip Supplemental Material Section

Supplemental Material

References

  1. Libelium. 50 Sensor Applications for a Smarter World. Retrieved from http://www.libelium.com/top_50_iot_sensor_applications_ranking.Google ScholarGoogle Scholar
  2. Y. Wang, G. Attebury, and B. Ramamurthy. 2006. A survey of security issues in wireless sensor networks. IEEE Communications Surveys 8 Tutorials, 8, 2.Google ScholarGoogle Scholar
  3. Object Management Group. 2003. MDA Guide Version 1.0.1. OMG Document Number omg/2003-06-01. Retrieved from http://www.omg.org/news/meetings/workshops/UML_2003_Manual/00-2_MDA_Guide_v1.0.1.pdf.Google ScholarGoogle Scholar
  4. OMG. 2017. Unified Modelling LanguageTM. Retrieved from http://www.omg.org/spec/UML/.Google ScholarGoogle Scholar
  5. Y. Vanderperren, W. Mueller, and W. Dehaene. 2008. UML for electronic systems design: A comprehensive overview, Design Automation for Embedded Systems, 12, 4, December 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Lavagno, G. Martin, and B. Selic. 2003. UML for Real: Design of Embedded Real-Time Systems. Kluwer. Google ScholarGoogle ScholarCross RefCross Ref
  7. Object Management Group, UML Profile for MARTE: Modeling and Analysis of Real-Time Embedded Systems, version 1.1, OMG document: formal/2011-06-02, 2011.Google ScholarGoogle Scholar
  8. E. Ebeid, J. Medina, D. Quaglia, and F. Fummi. 2015. Extensions to the UML profile for MARTE for distributed embedded systems. In Proceedings of the Forum on Specification and Design Languages (FDL’2015). Google ScholarGoogle ScholarCross RefCross Ref
  9. D. Harel, H. Kugler, and A. Pnueli. 2005. Synthesis revisited: Generating statechart models from scenario-based requirements. In Formal Methods in Software and System Modeling.Google ScholarGoogle Scholar
  10. M. Adamski. 2009. Design of reconfigurable logic controllers from hierarchical UML state machines. In Proceedings of the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA’09). Google ScholarGoogle ScholarCross RefCross Ref
  11. W. Mueller, A. Rosti, S. Bocchio, E. Riccobene, P. Scandurra, W. Dehaene, and Y. Vanderperren. 2006. UML for ESL design -- Basic principals, tools, and applications. In Proceedings of the 2006 IEEE/ACM International Conference on Computer-Aided Design. Google ScholarGoogle ScholarCross RefCross Ref
  12. E. Piel, R. B. Atitallah, P. Marquet, S. Meftali, S. Niar, A. Etien, J. L. Dekeyser, and P. Boulet. 2008. Gaspard2: From MARTE to systemic simulation. In Proceedings of the Design, Automation and Test in Europe (DATE 08).Google ScholarGoogle Scholar
  13. J. L. Dekeyser, A. Gamatié, A. Etien, R. B. Atitallah, and P. Boulet. 2008. Using the UML profile for MARTE to MPSoC Co-Design. In Proceedings of the 1st International Conference on Embedded Systems 8 Critical Applications (ICESCA’08).Google ScholarGoogle Scholar
  14. I. R. Quadri, Yu Huafeng, A. Gamatie, E. Rutten, S. Meftali, and J.-L. Dekeyser. 2010. Targeting reconfigurable FPGA based SoCs using the UML MARTE profile: From high abstraction levels to code generation. International Journal of Embedded Systems, 4, 3--4, 204--24, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  15. J. Vidal, F. de Lamotte, G. Gogniat, P. Soulard, and J. P. Diguet. 2009. A code-design approach for embedded system modelling and code generation with UML and MARTE. In Proceedings of DATE’09 (Dresden. Germany, Mar.), 2009.Google ScholarGoogle Scholar
  16. F. Herrera, H. Posadas, P. Peñil, E. Villar, F. Ferrero and R. Valencia. 2014. The COMPLEX methodology for UML/MARTE modeling and design-space exploration of embedded systems. Journal of System Architecture, 60, 1, 55--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Giovanni Saggio, Pietro Cavallo, Luigi Bianchi, Lucia R. Quitadamo, and Franco Giannini. 2009. UML model applied as a useful tool for wireless body area networks. Wireless Communication, Vehicular Technology, Information Theory and Aerospace 8 Electronic Systems Technology, 2009.Google ScholarGoogle Scholar
  18. Luca Berardinelli, Vittorio Cortellessa, and Stefano Pace. 2011. Modeling and analyzing performance of software for wireless sensor networks. In Proceedings of 2nd International Workshop on Software Engineering for Sensor Network Applications (SESENA’11). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. E. Ebeid, D. Quaglia, and F. Fummi. 2012. Generation of systemC/TLM code from UML/MARTE sequence diagrams for verification. In Proceedings of the 2012 IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits 8 Systems (DDECS’12). Google ScholarGoogle ScholarCross RefCross Ref
  20. Marcello Mura and Maria Giovanna Sami. 2008. Code generation from statecharts: Simulation of wireless sensor networks digital system design architectures. In Proceedings of the 2008 11th EUROMICRO Conference on Digital System Design Architectures, Methods and Tools (DSD’08).Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sunghyuck Hong and Sunho Lim. 2010. Analysis of attack models via unified modeling language in wireless sensor networks: A survey study. In Proceedings of the 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS).Google ScholarGoogle Scholar
  22. E. Ebeid, F. Fummi, and D. Quaglia. 2013. UML-based modeling and simulation of environmental effects in networked embedded systems. In Proceedings of the 16th Euromicro Conference on Digital System Design (DSD’13). 787. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. E. Ebeid, F. Fummi, D. Quaglia, H. Posadash, and E. Villar. 2014. A framework for design space exploration and performance analysis of networked embedded systems. In Proceedings of the 6th Workshop on Rapid Simulation and Performance Evaluation: Methods and Tools (RAPIDO’14). ACM, New York, NY, USA, Article 2, 8 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Jürjens. 2002. UMLsec: Extending UML for secure systems development. In Proceedings of the 5th International Conference on Unified Modeling Language. Model Engineering, Concepts, and Tools. Lecture Notes in Computer Science, vol. 2460. Springer, Berlin, 412--425.Google ScholarGoogle Scholar
  25. J. Jurjens, and J. Fox. 2006. Tools for model-based security engineering. In Proceedings of the 28th International Conference on Software Engineering. 819--822. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. Jürjens. 2008. Model-based security analysis for mobile communications. In Proceedings of the 2008 ACM/IEEE 30th International Conference on Software Engineering (ICSE’08). 683--692. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. Jürjens. 2011. Automated security hardening for evolving UML models. In Proceedings of the 2011 33rd International Conference on Software Engineering (ICSE’11). 986--988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Murray Woodside, Dorina C. Petriu, Dorin B. Petriu, Jing Xu, Tauseef Israr, Geri Georg, Robert France, James M. Bieman, Siv Hilde Houmb, and Jan Jürjens. 2009. Performance analysis of security aspects by weaving scenarios extracted from UML models. Journal of Systems and Software 82, 1, 56--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. Gligor, N. Fournel, and F. Pétrot. 2009. Using binary translation in event driven simulation for fast and flexible MPSoC simulation. In Proceedings of CODES+ISSS’09. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. P. Botella, P. S´nchez, and H. Posadas. 2010. Automatic generation of systemc SMP Models for HW/SW co-simulation. In Proceedings of the XXV Conference on Design of Circuits and Integrated Systems (DCIS’10).Google ScholarGoogle Scholar
  31. P. Gerin, M. Hamayun, and F. Petrot. 2009. Native MPSoC co-simulation environment for software performance estimation. In Proceedings of CODES+ISSS’09. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. M. Mekni and B. Moulin. 2008. A survey on sensor webs simulation tools. In Proceedings of the 2008 2nd International Conference on Sensor Technologies and Applications. 574--579. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Andriy Stetsko, Martin Stehl&icute;k, and Vashek Matyas. 2011. Calibrating and comparing simulators for wireless sensor networks. In MASSIEEE. 733--738.Google ScholarGoogle Scholar
  34. D. Curren. 2005. A survey of simulation in sensor networks. University of Binghamton project report for subject CS580.Google ScholarGoogle Scholar
  35. H. L. Harsh Sundani, Vijay K. Devabhaktuni, Mansoor Alam, and Prabir Bhattacharya. 2010. Wireless sensor network simulators a survey and comparisons. International Journal of Computer Networks (IJCN) 2, 2010.Google ScholarGoogle Scholar
  36. Contiki. 2017. Contiki: The Open Source OS for the Internet of Things. Retrieved from http://www.contiki-os.org/.Google ScholarGoogle Scholar
  37. A. Boulis. 2007. Demo abstract: Castalia: Revealing pitfalls in designing distributed algorithms in WSN. In Proceedings of the 5th ACM Conference on Embedded Networked Sensor Systems. 407--408.Google ScholarGoogle Scholar
  38. NS-2. 2007. The Network Simulator. Retrieved from https://www.isi.edu/nsnam/ns/.Google ScholarGoogle Scholar
  39. NS-3. 2015. Homepage. Retrieved from http://www.nsnam.org/.Google ScholarGoogle Scholar
  40. OMNeT++. 2012. Homepage.Retrieved from www.omnetpp.org.Google ScholarGoogle Scholar
  41. X. Zeng, R. Bagrodia, and M. Gerla. 1998. GloMoSim: A library for parallel simulation of large-scale wireless networks. In Proceedings of the 12th Workshop on Parallel and Distributed Simulation. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Philip Levis, Nelson Lee, Matt Welsh, and David Culler. 2003. TOSSIM: Accurate and scalable simulation of entire TinyOS applications. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. Los Angeles, California, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. B. L. Titzer, J. Palsberg, and D. K. Lee. 2005. Avrora: Scalable sensor network simulation with precise timing. In Proceedings of the 4th International Conference on Information Processing in Sensor Networks. Google ScholarGoogle ScholarCross RefCross Ref
  44. R. Bagrodia, R. Meyer, M. Takai, Yu-An Chen, Xiang Zeng, J. Martin, and Ha Yoon Song. 1998. Parsec: A parallel simulation environment for complex systems. In Computer 31, 10 (Oct. 1998), 77--85.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. TinyOS. 2012. Homepage. Retrieved from http://www.tinyos.net.Google ScholarGoogle Scholar
  46. Peng Lei1 and Zeng Jiazhi. 2007. WSM: Introduction, design and case study. In Wireless Communications, Networking and Mobile Computing (WiCom 2007).Google ScholarGoogle Scholar
  47. A. Sobeih, J. C. Hou, L.-C. Kung, N. Li, H. Zhang, W.-P. Chen, H.-Y. Tyan, and H. Lim. 2006. J-Sim: A simulation and emulation environment for wireless sensor networks. IEEE Wireless Communications 13, 4, 104--119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. S. Dhurandher, S. Misra, M. Obaidat, and S. Khairwal. 2008. UWSim: A simulator for underwater sensor networks. Simulation 84, 7, 327--338. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. S. P. Fekete, A. Kroller, S. Fischer, and D. Pfisterer. 2007. Shawn: The fast, highly customizable sensor network simulator. In Proceedings of the 4th International Conference on Networked Sensing Systems (INSS 2007). Google ScholarGoogle ScholarCross RefCross Ref
  50. G. Simon, P. Volgyesi, M. Maroti, and A. Ledeczi. 2003. Simulation-based optimization of communication protocols for large-scale wireless sensor networks. In Proceedings of the IEEE Aerospace Conference. Google ScholarGoogle ScholarCross RefCross Ref
  51. Institute for Software Intergrated System. 2015 Jprowler. Retrieved from http://www.isis.vanderbilt.edu/Projects/nest/jprowler/.Google ScholarGoogle Scholar
  52. J. Polley, D. Blazakis, J. McGee, D. Rusk, J. S. Baras, and M. Karir. 2004. ATEMU: A fine-grained sensor network simulator. In Proceedings of the 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks. Google ScholarGoogle ScholarCross RefCross Ref
  53. Papyrus. 2015. Homepage. Retrieved from http://www.papyrusuml.org/.Google ScholarGoogle Scholar
  54. MOF Model to Text Transformation Language, v1.0. 2008. OMG Document Number: formal/2008-01-16. http://www.omg.org/spec/MOFM2T/1.0/PDF.Google ScholarGoogle Scholar
  55. Acceleo. 2010. Homepage. Retrieved from http://www.acceleo.org.Google ScholarGoogle Scholar
  56. Freertos. 2014. Homepage. Retrieved from http://www.freertos.org.Google ScholarGoogle Scholar
  57. R. P. Torres, L. Valle, M. Domingo, S. Loredo, and M. C. Diez. 1999. CINDOOR: An engineering tool for planning and design of wireless systems in enclosed spaces. IEEE Antennas and Propagation Magazine 41, 4, 11--21 Google ScholarGoogle ScholarCross RefCross Ref
  58. Shahriar Mohammadi and Hossein Jadidoleslamy. 2011. A comparison of link layer attacks on wireless sensor networks. International Journal on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks (GRAPH-HOC) 3, 1 (March 2011). DOI:10.5121/jgraphhoc.2011.3103 Google ScholarGoogle ScholarCross RefCross Ref
  59. Prabhudutta Mohanty, Sangram Panigrahi, Nityananda Sarma, and Siddhartha Sankar Satapathy. 2010. Security issues in wireless sensor network data gathering protocols: A survey. Journal of Theoretical and Applied Information Technology 13, 14--27.Google ScholarGoogle Scholar
  60. K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy. 2011. Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys and Tutorials 13, 2, 245--257. Google ScholarGoogle ScholarCross RefCross Ref
  61. P. Reindl, K. Nygard, and D. Xiaojiang. 2010. Defending malicious collision attacks in wireless sensor networks. IEEE/IFIP Conference on Embedded and Ubiquitous Computing (EUC). Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. A. D. Wood and J. A. Stankovic. 2004. A taxonomy for denial-of-service attacks in wireless sensor networks, Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems.Google ScholarGoogle Scholar
  63. Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, and Kendall Nygard. 2003. Prevention of cooperative black hole attack in wireless ad hoc networks. In Proceedings of the International Conference on Wireless Networks.Google ScholarGoogle Scholar
  64. Jing Deng, Richard Han, and Shivakant Mishra. 2005. Defending against path-based DoS attacks in wireless sensor networks. In Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’05). ACM, New York, NY, USA, 89--96. DOI:http://dx.doi.org/10.1145/1102219.1102235 Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. M. Yasir. 2012. An outline of security in wireless sensor networks threats, Ccountermeasures and implementations. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management Book. 507--527.Google ScholarGoogle Scholar
  66. Yuanyuan Zhang and Marine Minier. 2012. Selective forwarding attacks against data and ACK flows in network coding and countermeasures. Journal of Computer Networks and Communications 2012, Article ID 184783, 14 pages. DOI:10.1155/2012/184783 Google ScholarGoogle ScholarCross RefCross Ref
  67. Akhil Dubey, Vaishali Jain, and Ashwani Kumar. 2014. A survey in energy drain attacks and their countermeasures in wireless sensor networks. International Journal of Engineering Research 8 Technology 3--2 (February 2014).Google ScholarGoogle Scholar
  68. Virendra Pal Singh, Sweta Jain, and Jyoti Singhai. 2010. Hello Flood attack and its countermeasures in wireless sensor networks. International Journal of Computer Science Issues (IJCSI) 7, 3, 11.Google ScholarGoogle Scholar
  69. M. Y. Abdullah and N. Alsharabi. 2008. Wireless sensor networks misdirection attacker challenges and solutions. In Proceedings of the IEEE International Conference of Automation (ICIA).Google ScholarGoogle Scholar
  70. Akhil Dubey, Deepak Meena, and Shaili Gaur. 2014. A survey in hello flood attack in wireless sensor networks. International Journal of Engineering Research 8 Technology 3, 1 (January 2014).Google ScholarGoogle Scholar
  71. I. Krontiris, T. Giannetsos, and T. Dimitriou. 2008. Launching a sinkhole attack in wireless sensor networks; the intruder side, In Proceedings of the 2008 IEEE International Conference on Wireless 8 Mobile Computing, Networking 8 Communication. IEEE Computer Society, Washington, DC, 526--53Google ScholarGoogle Scholar
  72. V. Bharath Srinivas and Syed Umar. 2013. Spoofing attacks in wireless sensor networks. IJCSET 3, 6, 201--210.Google ScholarGoogle Scholar
  73. James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. 2004. The Sybil attack in sensor networks: Analysis 8 defenses, In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Haafizah Rameeza Shaukat, Fazirulhisyam Hashim, Aduwati Sali, and M. Fadlee Abdul Rasid. 2014. Node replication attacks in mobile wireless sensor network: A survey. International Journal of Distributed sensor Networks 2014ID 402541, 15 pages.Google ScholarGoogle Scholar
  75. T. Kavitha and D. Sridharan. 2010. Security vulnerabilities in wireless sensor networks: A survey. Journal of Information Assurance and Security 5, 31--44.Google ScholarGoogle Scholar
  76. http://ftp1.digi.com/support/documentation/90000976_C.pdf.Google ScholarGoogle Scholar
  77. H. Posadas, P. Peñil, A. Nicol´s, and E. Villar. 2014. Automatic synthesis of embedded SW for evaluating physical implementation alternatives from UML/MARTE models supporting memory space separation. Microelectronics Journal 45, 10 (Oct. 2014), 1281--1291. DOI:10.1016/j.mejo.2013.11.003 Google ScholarGoogle ScholarCross RefCross Ref
  78. H. Posadas, J. Castillo, D. Quijano, V. Fernandez, E. Villar, and M. Martinez. 2010. System platform modeling for behavioral simulation and performance estimation of embedded systems. In L. Gomes, 8 J. Fernandes (Eds.), Behavioral Modeling for Embedded Systems and Technologies: Applications for Design and Implementation. 219--243. Google ScholarGoogle ScholarCross RefCross Ref
  79. Alvaro Diaz, Raul Diego, and Pablo Sanchez. 2012. Virtual platform for wireless sensor networks. In Proceedings of the 2012 15th Euromicro Conference on Digital System Design. 858--865. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. High-Level Design of Wireless Sensor Networks for Performance Optimization Under Security Hazards

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Sensor Networks
              ACM Transactions on Sensor Networks  Volume 13, Issue 3
              August 2017
              308 pages
              ISSN:1550-4859
              EISSN:1550-4867
              DOI:10.1145/3129740
              • Editor:
              • Chenyang Lu
              Issue’s Table of Contents

              Copyright © 2017 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 August 2017
              • Accepted: 1 March 2017
              • Revised: 1 March 2016
              • Received: 1 February 2016
              Published in tosn Volume 13, Issue 3

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader