원문정보
초록
영어
Recent advancement in Wireless Sensor Networks (WSNs) has paved the way for WSNs to enable in various environments in monitoring temperature, motion, sound, and vibration. These applications often include the detection of sensitive information from enemy movements in hostile areas or in locations of personnel in buildings. Due to characteristics of WSNs and dealing with sensitive information, wireless sensor nodes tend to be exposed to the enemy or in a hazard area, and security is a major concern in WSNs. Because WSNs pose unique challenges, traditional security techniques used in conventional networks cannot be applied directly, many researchers have developed various security protocols to fit into WSNs. To develop countermeasures of various attacks in WSNs, descriptions and analysis of current security attacks in the network layers must be developed by using a standard notation. However, there is no research paper describing and analyzing security models in WSNs by using a standard notation such as The Unified Modeling Language (UML). Using the UML helps security developers to understand security attacks and design secure WSNs. In this research, we provide standard models for security attacks by UML Sequence Diagrams to describe and analyze possible attacks in the three network layers.
목차
1. Introduction
2. PHYSICAL LAYER: JAMMING AND TAMPERING
2.1 Jamming Attack
2.2 Tampering Attack
3. DATA LINK LAYER: COLLISION, RESOURCE EXHAUSTION, AND UNFAIRNESS
3.1 Collision Attack
3.2 Resource Exhaustion Attack
3.3 Unfairness Attack
4. TRANSPORT LAYER: FLOODING AND DESYNCHRONIZATION
4.1 Flooding Attack
4.2 Desynchronization Attack
5. CONCLUDING REMARKS AND FUTURE WORK
REFERENCES