CFP last date
20 May 2024
Reseach Article

UML Modeling of Physical and Data Link Layer Security Attacks in WSN

by S N Uke, A. R. Mahajan, R C Thool
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 11
Year of Publication: 2013
Authors: S N Uke, A. R. Mahajan, R C Thool
10.5120/12006-7132

S N Uke, A. R. Mahajan, R C Thool . UML Modeling of Physical and Data Link Layer Security Attacks in WSN. International Journal of Computer Applications. 70, 11 ( May 2013), 25-28. DOI=10.5120/12006-7132

@article{ 10.5120/12006-7132,
author = { S N Uke, A. R. Mahajan, R C Thool },
title = { UML Modeling of Physical and Data Link Layer Security Attacks in WSN },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 11 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 25-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number11/12006-7132/ },
doi = { 10.5120/12006-7132 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:35.326447+05:30
%A S N Uke
%A A. R. Mahajan
%A R C Thool
%T UML Modeling of Physical and Data Link Layer Security Attacks in WSN
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 11
%P 25-28
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks (WSNs) are growing extremely and becoming more and more attractive for a variety of application areas such as surveillance of information, industrial secrets, air pollution monitoring, area monitoring, and forest fire detection, home automation, industry monitoring, and many more. As WSN is mostly used for gathering application specific information from the surrounding environment, it is highly essential to protect the sensitive data from unauthorized access. WSNs are vulnerable to various security attacks because of broadcast nature of radio transmission. The primary weakness shared by all wireless application and technologies is the vulnerability to security attacks/threats. The performance and behaviour of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behaviour of the attacks. This paper aims at addressing behavioral modeling of critical security attack residing in the physical layer and data link layer of wireless sensor network. UML gives the finest diagrammatic representation of any system which is best for developers. Our efforts to synchronize WSN with UML are discussed in the paper. The security attacks are modeled by using state machine diagram of Unified Modelling Language (UML). This modeling of security attacks will help programmers to develop counter measures.

References
  1. Sunghyuck Hong and Sunho Limt "Analysis of Attack Models via Unified Modeling Language in Wireless Sensor Networks: A Survey Study. "
  2. OMG (February 2009). "OMG Unified Modeling Language (OMG UML)", Superstructure Version 2. 2". http://www. omg. org/spec/UML/2. 2/Superstructure/PDF
  3. Chaudhari H. C. and Kadam L. U. "Wireless Sensor Networks: Security, Attacks and Challenges", International Journal of Networking Volume 1, Issue 1, 2011, pp-04-16.
  4. Pranav M. Pawar, Rasmus H. Nielsen, Neeli R. Prasad, Shingo Ohmoriand Ramjee Prasad, "Behavioural Modelling of WSN MAC Layer Security Attacks: A Sequential UML Approach", Center for TeleInFrastruktur, Aalborg University.
  5. TEODOR-GRIGORE LUPU, University "Politehnica" of Timisoara, Faculty of Automatics and Computers, Main Types of Attacks in Wireless Sensor Networks, Vasile Parvan 2, 300223, Timisoara, ROMANIA.
  6. Siebe Datema, :A Case Study of Wireless Sensor Network Attacks", Delft University of Technology, Delft University of Technology.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor networks (WSNs) Physical layer data link layer unified modelling language (UML) state machine diagram security and attacks