Formal Verification of Mobile Agent Based Anomaly Detection in Wireless Sensor Networks

被引:2
作者
Usman, Muhammad [1 ]
Muthukkumarasamy, Vallipuram [1 ]
Wu, Xin-Wen [1 ]
机构
[1] Griffith Univ, Sch Informat & Commun Technol, Nathan, Qld 4222, Australia
来源
PROCEEDINGS OF THE 2013 38TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS) | 2013年
关键词
Anomaly detection; behavior tree; formal verification; mobile agent; wireless sensor networks (WSNs); CALCULUS;
D O I
10.1109/LCNW.2013.6758544
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile agent technology offers a number of advantages to resource constrained Wireless Sensor Networks (WSNs) by facilitating parallelism, code and data dissemination, localization, and distributed security services. As part of the second line of defense for WSNs, anomaly detection schemes are also benefiting from mobile agent technology. The formal verification can be used to validate the correctness of a system using formal specifications. This study employs Behavior Trees (BTs) for formal verification of mobile agent based anomaly detection system in WSNs. We employed BT based formal semantics to integrate the behavior projection of different components of anomaly detection system. The Symbolic Analysis Laboratory (SAL) tool is used to formally specify the behavior tree model. The analysis based on Linear Temporal Logic (LTL) theorems validates the completeness and consistency of the formal model of mobile agent based anomaly detection system.
引用
收藏
页码:1001 / 1009
页数:9
相关论文
共 24 条
[1]  
[Anonymous], P 8 GI ITG KUVS FACH
[2]   From requirements to design: Formalizing the key steps [J].
Dromey, RG .
FIRST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2003, :2-11
[3]  
Dutertre B., 2013, SAL 3 2 BINARIES YIC
[4]  
Eludiora S. I., 2011, IEEE INT C EL INF TE, P1
[5]  
Godskesen JC, 2007, LECT NOTES COMPUT SC, V4467, P132
[6]  
Kachirski O., 2003, P 36 ANN HAW INT C S, P57
[7]  
Ketel M, 2008, PROCEEDINGS OF THE 40TH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, P74
[8]  
Krugel C., 2001, P ICSE WORKSH SOFTW, P1
[9]  
Law YW, 2003, LECT NOTES COMPUT SC, V2775, P27
[10]   An Observational Theory for Mobile Ad Hoc Networks [J].
Merro, Massimo .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 173 :275-293