earticle

논문검색

A Survey Study on Standard Security Models in Wireless Sensor Networks

초록

영어

Recent advancement in Wireless Sensor Networks (WSNs) has paved the way for WSNs to enable in various environments in monitoring temperature, motion, sound, and vibration. These applications often include the detection of sensitive information from enemy movements in hostile areas or in locations of personnel in buildings. Due to characteristics of WSNs and dealing with sensitive information, wireless sensor nodes tend to be exposed to the enemy or in a hazard area, and security is a major concern in WSNs. Because WSNs pose unique challenges, traditional security techniques used in conventional networks cannot be applied directly, many researchers have developed various security protocols to fit into WSNs. To develop countermeasures of various attacks in WSNs, descriptions and analysis of current security attacks in the network layers must be developed by using a standard notation. However, there is no research paper describing and analyzing security models in WSNs by using a standard notation such as The Unified Modeling Language (UML). Using the UML helps security developers to understand security attacks and design secure WSNs. In this research, we provide standard models for security attacks by UML Sequence Diagrams to describe and analyze possible attacks in the three network layers.

목차

Abstract
 1. Introduction
 2. PHYSICAL LAYER: JAMMING AND TAMPERING
  2.1 Jamming Attack
  2.2 Tampering Attack
 3. DATA LINK LAYER: COLLISION, RESOURCE EXHAUSTION, AND UNFAIRNESS
  3.1 Collision Attack
  3.2 Resource Exhaustion Attack
  3.3 Unfairness Attack
 4. TRANSPORT LAYER: FLOODING AND DESYNCHRONIZATION
  4.1 Flooding Attack
  4.2 Desynchronization Attack
 5. CONCLUDING REMARKS AND FUTURE WORK
 REFERENCES

저자정보

  • Sang Ho Lee Software Engineering, Chungbuk University

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 기관로그인 시 무료 이용이 가능합니다.

      • 4,000원

      0개의 논문이 장바구니에 담겼습니다.