Formal specifications of Denial of Service attacks in Wireless Sensor Networks

Saghar, Kashif, Farid, Hunaina, Kendall, David and Bouridane, Ahmed (2016) Formal specifications of Denial of Service attacks in Wireless Sensor Networks. In: 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, Piscataway, NJ, pp. 324-333. ISBN 978-1-4673-9126-9

Full text not available from this repository. (Request a copy)
Official URL: http://dx.doi.org/10.1109/IBCAST.2016.7429898

Abstract

Wireless Sensor Networks (WSN) are composed of small, low cost, resource-constrained computing nodes equipped with low power wireless transceivers. Their unattended nature and possible deployment in hostile environmental conditions poses several challenges in ensuring that a WSN is formed effectively and survives long enough to fulfill its function. WSN nodes are vulnerable to many Denial of Services(DoS) attacks. To secure WSN still against attacks many innovative solutions/protocols have been proposed. However, a number of ambiguities exist in the definition of these DoS attacks. To remove these ambiguities and to clarify our specifications we represented the DoS attacks in a formal modeling notation Z. The specifications are written in a bottom-up approach starting from the basic definitions (like node, message etc), specifying simple operations of WSN (like receive, transmit etc), complex operations (like eavesdrop key, node capture etc) and going all the way up to formally define the DoS attacks. Different WSN routing protocols are then specified to confirm their vulnerability against DoS attacks. Use of Formal methods, thus, confirms how vulnerable a particular routing protocol is against a particular attack. This is a novel work and to the best of our knowledge DoS attacks have not yet been formally defined.

Item Type: Book Section
Uncontrolled Keywords: Formal Modeling and Verification, Formal Specifications, Protocol Verification, Routing Protocol, Security Attacks, Wireless Sensor Networks (WSN)
Subjects: G400 Computer Science
Department: Faculties > Engineering and Environment > Computer and Information Sciences
Depositing User: Becky Skoyles
Date Deposited: 05 Aug 2016 10:51
Last Modified: 10 Nov 2016 12:38
URI: http://nrl.northumbria.ac.uk/id/eprint/27480

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics


Policies: NRL Policies | NRL University Deposit Policy | NRL Deposit Licence