38th Annual IEEE Conference on Local Computer Networks - Workshops 2013
DOI: 10.1109/lcnw.2013.6758544
|View full text |Cite
|
Sign up to set email alerts
|

Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks

Abstract: Mobile agent technology offers a number of advantages to resource constrained Wireless Sensor Networks (WSNs) by facilitating parallelism, code and data dissemination, localization, and distributed security services. As part of the second line of defense for WSNs, anomaly detection schemes are also benefiting from mobile agent technology. The formal verification can be used to validate the correctness of a system using formal specifications. This study employs Behavior Trees (BTs) for formal verification of mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…Tobarra et al [25] use the Avispa model checking tool to formally verify a security protocol for WSN. Usman et al [26] demonstrate formal verication of mobile agent-based anomaly detection for WSN using the Symbolic Analysis Laboratory model checking tool. Dong et al [27] use a formal specication language for sensor networks and perform formal verication using SAT-solvers.…”
Section: Related Workmentioning
confidence: 99%
“…Tobarra et al [25] use the Avispa model checking tool to formally verify a security protocol for WSN. Usman et al [26] demonstrate formal verication of mobile agent-based anomaly detection for WSN using the Symbolic Analysis Laboratory model checking tool. Dong et al [27] use a formal specication language for sensor networks and perform formal verication using SAT-solvers.…”
Section: Related Workmentioning
confidence: 99%
“…An effective design and verification of the completeness and correctness of the mobile agent-based systems are desired before their deployment [12], [13]. A poorly designed or non-validated system may take a mobile agent-based system into the halt state, or it can adversely impact on the limited resources of sensor nodes.…”
Section: Introductionmentioning
confidence: 99%