Formally verified solution to resolve tunnel attacks in wireless sensor network

Saghar, Kashif, Farid, Hunaina and Bouridane, Ahmed (2017) Formally verified solution to resolve tunnel attacks in wireless sensor network. In: 2017 14th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, Piscataway, pp. 448-455. ISBN 978-1-4673-9074-3

Full text not available from this repository. (Request a copy)
Official URL: https://doi.org/10.1109/IBCAST.2017.7868092

Abstract

In ad-hoc and wireless networks, Denial of Service (DoS) attacks has always been problematic during data routing. DoS attacks disrupt the data routing and avert the generated data to reach the destination or the sink nodes. In tunnel attack, which is one of the type of DoS attacks, the intruder attracts all the traffic towards itself and prevent it from forwarding further to the neighboring nodes. Researchers have presented multiple solutions to cater the problem and minimize or avoid the tunnel attacks, but they all have their shortcomings. The main reason behind all the drawbacks is that those solutions have not been confirmed using formal methods. The formal methods can be utilized to authenticate whether or not the solutions are immune to DoS attacks. In our previous researches, it has been revealed that by employing formal methods, our newly developed protocol RAEED can detect and avoid many DoS attacks. In this research paper, it has been proved using model checker that RAEED can efficiently avoid both simple and intelligent tunnel attacks. Moreover, the results of formal methods have been confirmed with the help of computer simulations as well as practical implementation on MicaZ motes. In future we aim to employ formal methods to verify more wireless communication issues in multiple protocols.

Item Type: Book Section
Uncontrolled Keywords: Wireless Security, Validation and Verification, Wireless Sensor Networks (WSN), Assurance technologies, Formal Methods, Denial of Services
Subjects: G400 Computer Science
Department: Faculties > Engineering and Environment > Computer and Information Sciences
Depositing User: Becky Skoyles
Date Deposited: 03 Oct 2017 15:37
Last Modified: 12 Oct 2019 20:40
URI: http://nrl.northumbria.ac.uk/id/eprint/32219

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics