Skip to main content

2017 | OriginalPaper | Buchkapitel

UML Modeling of Cross-Layer Attack in Wireless Sensor Networks

verfasst von : Jian Wang, Abraham O. Fapojuwo, Chen Zhang, Huiting Tan

Erschienen in: Interoperability, Safety and Security in IoT

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The openness of wireless communication and the unattended nature of sensor node deployment make it easy for an adversary to launch various attacks on wireless sensor networks. Cross-layer attack aims to achieve better attack effects, conceal attack behavior more better, reduce the cost of attack by using information from multiple protocol layers, or initiate attack at multiple layers cooperatively. There are now different understandings about cross-layer attack. In this paper, the definition of cross-layer attack is proposed and several cases of attacks are presented. In order to better understand their behaviors, the cases of cross-layer attack are modeled by utilizing unified modeling language, which helps to build more secure wireless sensor networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wood, A.D., Stankvic, J.A.: Denial of service in sensor networks. IEEE Comput. 35(10), 54–62 (2002)CrossRef Wood, A.D., Stankvic, J.A.: Denial of service in sensor networks. IEEE Comput. 35(10), 54–62 (2002)CrossRef
2.
Zurück zum Zitat Wang, X., Gu, W., Schosek, K., Chellappan, S., Xuan, D.: Sensor network configuration under physical attacks. Technical Report:OSU-CISRC-7/04-TR45, Department of Computer Science and Engineering, Ohio State University (2004) Wang, X., Gu, W., Schosek, K., Chellappan, S., Xuan, D.: Sensor network configuration under physical attacks. Technical Report:OSU-CISRC-7/04-TR45, Department of Computer Science and Engineering, Ohio State University (2004)
3.
Zurück zum Zitat Katsaiti, M., Rigas, A., Tzemos, I., Sklavos, N.: Real-world attacks toward circuits and systems design, targeting safety invasion. In: Proceedings of the 4th International Conference on Modern Circuits and System Technologies (MOCAST) (2015) Katsaiti, M., Rigas, A., Tzemos, I., Sklavos, N.: Real-world attacks toward circuits and systems design, targeting safety invasion. In: Proceedings of the 4th International Conference on Modern Circuits and System Technologies (MOCAST) (2015)
4.
Zurück zum Zitat Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3), 41–47 (2006)CrossRef Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3), 41–47 (2006)CrossRef
5.
Zurück zum Zitat Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of sleep attacks on wireless sensor network MAC protocols. IEEE Trans. Veh. Technol. 58(1), 367–380 (2009)CrossRef Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of sleep attacks on wireless sensor network MAC protocols. IEEE Trans. Veh. Technol. 58(1), 367–380 (2009)CrossRef
6.
Zurück zum Zitat Sokullu, R., Dagdeviren, O., Korkmaz, I.: On the IEEE 802.15.4 MAC layer attacks: GTS attack. In: Proceedings of the Second International Conference on Sensor Technologies and Applications (SENSORCOMM), pp. 673–678 (2008) Sokullu, R., Dagdeviren, O., Korkmaz, I.: On the IEEE 802.15.4 MAC layer attacks: GTS attack. In: Proceedings of the Second International Conference on Sensor Technologies and Applications (SENSORCOMM), pp. 673–678 (2008)
7.
Zurück zum Zitat Radosavac, S., Crdenas, A.A., Baras, J.S., Moustakides, G.V.: Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: robust strategies against individual and colluding attackers. J. Comput. Secur. 15(1), 103–128 (2007). Special Issue on Security of Ad Hoc and SensorNetworksCrossRef Radosavac, S., Crdenas, A.A., Baras, J.S., Moustakides, G.V.: Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: robust strategies against individual and colluding attackers. J. Comput. Secur. 15(1), 103–128 (2007). Special Issue on Security of Ad Hoc and SensorNetworksCrossRef
8.
Zurück zum Zitat Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. J. 1(2–3), 293–315 (2003)CrossRef Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. J. 1(2–3), 293–315 (2003)CrossRef
9.
Zurück zum Zitat Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM), vol. 3, pp. 1976–1986 (2003) Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM), vol. 3, pp. 1976–1986 (2003)
10.
Zurück zum Zitat Al-Shurman, M., Yoo, S.M., Park, S.: Black hole attack in mobile Ad hoc networks. In: Proceedings of the 42nd Annual ACM Southeast Regional Conference (ACM-SE’42) (2004) Al-Shurman, M., Yoo, S.M., Park, S.: Black hole attack in mobile Ad hoc networks. In: Proceedings of the 42nd Annual ACM Southeast Regional Conference (ACM-SE’42) (2004)
11.
Zurück zum Zitat Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the Third International Symposium on Information Processing in Sensor Networks ACM (IPSN), pp. 259–268 (2004) Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the Third International Symposium on Information Processing in Sensor Networks ACM (IPSN), pp. 259–268 (2004)
12.
Zurück zum Zitat Radosavac, S., Benammar, N., Baras, J.S.: Cross-layer attacks in wireless ad hoc networks. In: Proceedings of the 38th Annual Conference on Information Science and Systems (CISS). Princeton University (2004) Radosavac, S., Benammar, N., Baras, J.S.: Cross-layer attacks in wireless ad hoc networks. In: Proceedings of the 38th Annual Conference on Information Science and Systems (CISS). Princeton University (2004)
13.
Zurück zum Zitat Bian, K., Park, J.M., Chen, R.: Stasis Trap: cross-layer stealthy attack in wireless Ad hoc networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM) (2006) Bian, K., Park, J.M., Chen, R.: Stasis Trap: cross-layer stealthy attack in wireless Ad hoc networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM) (2006)
14.
Zurück zum Zitat Nagireddygari, D., Thomas, J.: MAC-TCP cross-layer attack and its defense in cognitive radio networks. In Proceedings of the 10th ACM International Symposium on QOS and Security for Wireless and Mobile Networks (Q2SWinet) (2014) Nagireddygari, D., Thomas, J.: MAC-TCP cross-layer attack and its defense in cognitive radio networks. In Proceedings of the 10th ACM International Symposium on QOS and Security for Wireless and Mobile Networks (Q2SWinet) (2014)
15.
Zurück zum Zitat Leόn, O., Hernández-Serrano, J., Soriano, M.: A new cross-layer attack to TCP in cognitive radio network. In: Proceedings of the Second International Workshop on Cross layer Design (IWCLD) (2009) Leόn, O., Hernández-Serrano, J., Soriano, M.: A new cross-layer attack to TCP in cognitive radio network. In: Proceedings of the Second International Workshop on Cross layer Design (IWCLD) (2009)
16.
Zurück zum Zitat Guang, L., Assi, C., Benslimane, A.: Interlayer attacks in mobile Ad hoc networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, Sajal, K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 436–448. Springer, Heidelberg (2006). doi:10.1007/11943952_37 CrossRef Guang, L., Assi, C., Benslimane, A.: Interlayer attacks in mobile Ad hoc networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, Sajal, K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 436–448. Springer, Heidelberg (2006). doi:10.​1007/​11943952_​37 CrossRef
17.
Zurück zum Zitat Shao, M., Zhu, S., Cao, G., Porta, T.L., Mohapatra, P.: A cross-layer dropping attack in video streaming over Ad hoc networks. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SECURECOMM) (2008) Shao, M., Zhu, S., Cao, G., Porta, T.L., Mohapatra, P.: A cross-layer dropping attack in video streaming over Ad hoc networks. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SECURECOMM) (2008)
18.
Zurück zum Zitat Panchenko, A., Pimenidis, L.: Cross-layer attack on anonymizing networks. In: Proceedings of the 15th International Conference on Telecommunication (ICT) (2008) Panchenko, A., Pimenidis, L.: Cross-layer attack on anonymizing networks. In: Proceedings of the 15th International Conference on Telecommunication (ICT) (2008)
19.
Zurück zum Zitat Wang, W., Sun, Y., Li, H., Han, Z.: Cross-layer attack and defense in cognitive radio networks. In: Proceedings of IEEE Global Telecommunication Conference (GLOBECOM) (2010) Wang, W., Sun, Y., Li, H., Han, Z.: Cross-layer attack and defense in cognitive radio networks. In: Proceedings of IEEE Global Telecommunication Conference (GLOBECOM) (2010)
20.
Zurück zum Zitat Djahel, S., Abdesselam, F.N., Khokhar, A.: A cross layer framework to mitigate a joint MAC and routing attack in multihop wireless network. In: Proceedings of the 5th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNET) (2009) Djahel, S., Abdesselam, F.N., Khokhar, A.: A cross layer framework to mitigate a joint MAC and routing attack in multihop wireless network. In: Proceedings of the 5th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNET) (2009)
21.
Zurück zum Zitat Uke, S.N., Mahajan, A.R., Thool, R.C.: UML modeling of physical and data link layer security attacks in WSN. Int. J. Comput. Appl. 70(11), 25–28 (2013) Uke, S.N., Mahajan, A.R., Thool, R.C.: UML modeling of physical and data link layer security attacks in WSN. Int. J. Comput. Appl. 70(11), 25–28 (2013)
22.
Zurück zum Zitat Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., Prasad, R.: Behavioral modeling of WSN MAC layer security attacks: a sequential UML approach. J. Cyber Secur. Mob. 1(1), 65–82 (2012) Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., Prasad, R.: Behavioral modeling of WSN MAC layer security attacks: a sequential UML approach. J. Cyber Secur. Mob. 1(1), 65–82 (2012)
23.
Zurück zum Zitat Hong, S., Lim, S.: Analysis of attack models via unified modeling language in wireless sensor networks: a survey study. In: Proceedings of IEEE International Conference on Wireless Communications, Networking and Information Security (WCINS) (2010) Hong, S., Lim, S.: Analysis of attack models via unified modeling language in wireless sensor networks: a survey study. In: Proceedings of IEEE International Conference on Wireless Communications, Networking and Information Security (WCINS) (2010)
Metadaten
Titel
UML Modeling of Cross-Layer Attack in Wireless Sensor Networks
verfasst von
Jian Wang
Abraham O. Fapojuwo
Chen Zhang
Huiting Tan
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-52727-7_12