首页> 外文会议>International Conference on Ubiquitous and Future Networks >Formal Modeling of Greedy Behavior in Secure Internet of Things Networks
【24h】

Formal Modeling of Greedy Behavior in Secure Internet of Things Networks

机译:安全行为中安全行为的正式建模网络

获取原文

摘要

In the Internet of Things (IoT) paradigm, objects should communicate through secure wireless channels and would be able to connect to the Internet. IEEE 802.15.4e and its old versions are the de-facto standards for Wireless Sensor Networks (WSNs) based IoT. IEEE 802.15.4e and its old versions define a slotted CSMA-CA medium access control and physical layer of WSNs. The IoT may experience a multitude of malicious attacks. One critical attack that threatens the network availability is the greedy behavior. In this paper, we propose a UPPAAL model to describe greedy and sane behaviors of IoT devices. We are interested in the contention access period of the beacon-enabled mode of the slotted CSMA-CA. The developed model shows that we can assess and identify both honest and greedy devices. However, it is the first step towards thwarting this attack.
机译:在物联网(物联网)范式中,对象应通过安全无线通道进行通信,并且能够连接到因特网。 IEEE 802.15.4e及其旧版本是基于无线传感器网络(WSNS)的De-Facto标准。 IEEE 802.15.4E及其旧版本定义了一个开槽的CSMA-CA媒体访问控制和WSN的物理层。物联网可能会遇到多种恶意攻击。一个威胁网络可用性的一个关键攻击是贪婪的行为。在本文中,我们提出了一个UPPAAL模型来描述物联网设备的贪婪和理智行为。我们对开槽CSMA-CA的信标模式的争用访问周期感兴趣。开发的模型表明,我们可以评估和识别诚实和贪婪的设备。但是,这是挫败这种攻击的第一步。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号