Interoperability, Safety and Security in IoT. Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers

Research Article

UML Modeling of Cross-Layer Attack in Wireless Sensor Networks

Download
314 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-52727-7_12,
        author={Jian Wang and Abraham Fapojuwo and Chen Zhang and Huiting Tan},
        title={UML Modeling of Cross-Layer Attack in Wireless Sensor Networks},
        proceedings={Interoperability, Safety and Security in IoT. Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers},
        proceedings_a={INTERIOT \& SASEIOT},
        year={2017},
        month={2},
        keywords={Cross-layer attack Unified modeling language Wireless sensor networks},
        doi={10.1007/978-3-319-52727-7_12}
    }
    
  • Jian Wang
    Abraham Fapojuwo
    Chen Zhang
    Huiting Tan
    Year: 2017
    UML Modeling of Cross-Layer Attack in Wireless Sensor Networks
    INTERIOT & SASEIOT
    Springer
    DOI: 10.1007/978-3-319-52727-7_12
Jian Wang1,*, Abraham Fapojuwo2,*, Chen Zhang1, Huiting Tan1
  • 1: National University of Defense Technology
  • 2: University of Calgary
*Contact email: jwang@nudt.edu.cn, fapojuwo@ucalgary.ca

Abstract

The openness of wireless communication and the unattended nature of sensor node deployment make it easy for an adversary to launch various attacks on wireless sensor networks. Cross-layer attack aims to achieve better attack effects, conceal attack behavior more better, reduce the cost of attack by using information from multiple protocol layers, or initiate attack at multiple layers cooperatively. There are now different understandings about cross-layer attack. In this paper, the definition of cross-layer attack is proposed and several cases of attacks are presented. In order to better understand their behaviors, the cases of cross-layer attack are modeled by utilizing unified modeling language, which helps to build more secure wireless sensor networks.