2011
DOI: 10.3837/tiis.2011.04.010
|View full text |Cite
|
Sign up to set email alerts
|

Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey

Abstract: Wireless Sensor Networks (WSNs) are rapidly emerging because of their potential applications available in military and civilian environments. Due to unattended and hostile deployment environments, shared wireless links, and inherent resource constraints, providing high level security services is challenging in WSNs. In this paper, we revisit various security attack models and analyze them by using a well-known standard notation, Unified Modeling Language (UML). We provide a set of UML collaboration diagram and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…In this paper [12], the authors have revisited the security attack models and analyzed them using the unified modelling language. They have used the interaction diagrams of UML to provide an in-depth knowledge of the attack at four different layers.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper [12], the authors have revisited the security attack models and analyzed them using the unified modelling language. They have used the interaction diagrams of UML to provide an in-depth knowledge of the attack at four different layers.…”
Section: Related Workmentioning
confidence: 99%
“…At last, the node with the maximum counter n c will be captured by the attacker (line 9). Then we adjust the entries of M 0 (line [11][12][13][14][15][16][17]. The attacking process will continue until the network is compromised.…”
Section: Attacking Algorithmmentioning
confidence: 99%
“…Researching the mechanisms of attacks [9,10] is of profound contribution in designing the defence techniques in WSNs, because modeling the behavior of the attacker [11,12] can provide fundamental for devising countermeasures to safeguard against various attacks. So far, researchers are focusing on attacking strategies in different attacks: the Sybil attack [13], the jamming attack [14], the Dos attack [15], and so on.…”
Section: Introductionmentioning
confidence: 99%
“…Researching the mechanisms of attacks is of profound contribution in designing the defense techniques in WSNs, because modeling the behavior of the attacker can provide basis for devising the countermeasures to safeguard against various attacks. So far, researchers have been focusing on attacking strategies in different attacks: the Sybil attack , the jamming attack , the DoS attack , and so on.…”
Section: Introductionmentioning
confidence: 99%