Formal Modeling of Greedy Behavior in Secure Internet of Things Networks

被引:0
作者
Boufenneche, Yassine [1 ]
Gharbi, Nawel [1 ]
Zitouni, Rafik [2 ]
George, Laurent [3 ]
机构
[1] USTHB, Dept Comp Sci, Algiers, Algeria
[2] ECE Paris, SIC Lab, Paris, France
[3] UPE ESIEE Paris, LIGM, Paris, France
来源
2019 ELEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2019) | 2019年
关键词
Internet of Things (IoT); Wireless Sensor Networks; Security; Greedy Behavior; UPPAAL Modeling; IEEE; 802.15.4e; Slotted CSMA-CA; CHALLENGES; PRIVACY; MAC;
D O I
10.1109/icufn.2019.8806168
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the Internet of Things (IoT) paradigm, objects should communicate through secure wireless channels and would be able to connect to the Internet. IEEE 802.15.4e and its old versions are the de-facto standards for Wireless Sensor Networks (WSNs) based IoT. IEEE 802.15.4e and its old versions define a slotted CSMA-CA medium access control and physical layer of WSNs. The IoT may experience a multitude of malicious attacks. One critical attack that threatens the network availability is the greedy behavior. In this paper, we propose a UPPAAL model to describe greedy and sane behaviors of IoT devices. We are interested in the contention access period of the beacon-enabled mode of the slotted CSMA-CA. The developed model shows that we can assess and identify both honest and greedy devices. However, it is the first step towards thwarting this attack.
引用
收藏
页码:188 / 193
页数:6
相关论文
共 27 条
[1]   Dealing with a non green behaviour in WSN [J].
Abdelli, Abdelkrim ;
Mokdad, Lynda ;
Ben Othman, Jalel ;
Hammal, Youcef .
SIMULATION MODELLING PRACTICE AND THEORY, 2018, 84 :124-142
[2]  
Abegunde J, 2016, IEEE TRUST BIG, P473, DOI [10.1109/TrustCom.2016.98, 10.1109/TrustCom.2016.0099]
[3]   Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs [J].
Al-Terri, Doaa ;
Otrok, Hadi ;
Barada, Hassan ;
Al-Qutayri, Mahmoud ;
Al Hammadi, Yousof .
COMPUTER COMMUNICATIONS, 2017, 104 :108-118
[4]   A THEORY OF TIMED AUTOMATA [J].
ALUR, R ;
DILL, DL .
THEORETICAL COMPUTER SCIENCE, 1994, 126 (02) :183-235
[5]  
Alur R., 1999, Computer Aided Verification. 11th International Conference, CAV'99. Proceedings (Lecture Notes in Computer Science Vol.1633), P8
[6]  
[Anonymous], 2004, Timed Automata: Semantics, Algorithms and Tools
[7]  
[Anonymous], 2006, IEEE STANDARD INFORM
[8]  
[Anonymous], 2016, Standard IEEE Std 802.11-2016, P1, DOI [DOI 10.1109/IEEESTD.2016.7460875, 10.1109/IEEESTD.2016.7786995, DOI 10.1109/IEEESTD.2016.7786995]
[9]  
Antonopoulos A, 2016, IEEE INTL CONF IND I, P1024, DOI 10.1109/INDIN.2016.7819313
[10]   Fog and IoT: An Overview of Research Opportunities [J].
Chiang, Mung ;
Zhang, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06) :854-864