TY - GEN
T1 - Analysis of attack models via unified modeling language in wireless sensor networks
AU - Hong, Sunghyuck
AU - Lim, Sunho
PY - 2010
Y1 - 2010
N2 - Wireless Sensor Networks (WSNs) are widely used in various environments in monitoring temperature, motion, sound, and vibration. These applications often include the detection of sensitive information from enemy movements in hostile areas or in locations of personnel in buildings. Due to characteristics of WSNs, nodes tend to be exposed to the enemy, and security is a major concern in WSNs. Many researchers have developed various security protocols. However, there is no research paper describing and analyzing security models in WSNs by using a standard notation such as The Unified Modeling Language (UML). Using the UML helps security developers to analyze security attacks and design secure WSNs. In this research, we provide standard models for security attacks by UML Sequence Diagrams to describe and analyze possible attacks in a network and transport layer.
AB - Wireless Sensor Networks (WSNs) are widely used in various environments in monitoring temperature, motion, sound, and vibration. These applications often include the detection of sensitive information from enemy movements in hostile areas or in locations of personnel in buildings. Due to characteristics of WSNs, nodes tend to be exposed to the enemy, and security is a major concern in WSNs. Many researchers have developed various security protocols. However, there is no research paper describing and analyzing security models in WSNs by using a standard notation such as The Unified Modeling Language (UML). Using the UML helps security developers to analyze security attacks and design secure WSNs. In this research, we provide standard models for security attacks by UML Sequence Diagrams to describe and analyze possible attacks in a network and transport layer.
KW - Security
KW - Standard attack models
KW - Unified modeling language
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=77957671484&partnerID=8YFLogxK
U2 - 10.1109/WCINS.2010.5541868
DO - 10.1109/WCINS.2010.5541868
M3 - Conference contribution
AN - SCOPUS:77957671484
SN - 9781424458516
T3 - Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010
SP - 692
EP - 696
BT - Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010
Y2 - 25 June 2010 through 27 June 2010
ER -