Formal Modeling of Greedy Behavior in Secure Internet of Things Networks - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2019

Formal Modeling of Greedy Behavior in Secure Internet of Things Networks

Résumé

In the Internet of Things (IoT) paradigm, objects should communicate through secure wireless channels and would be able to connect to the Internet. IEEE 802.15.4e and its old versions are the de-facto standards for Wireless Sensor Networks (WSNs) based IoT. IEEE 802.15.4e and its old versions define a slotted CSMA-CA medium access control and physical layer of WSNs. The IoT may experience a multitude of malicious attacks. One critical attack that threatens the network availability is the greedy behavior. In this paper, we propose a UPPAAL model to describe greedy and sane behaviors of IoT devices. We are interested in the contention access period of the beacon-enabled mode of the slotted CSMA-CA. The developed model shows that we can assess and identify both honest and greedy devices. However, it is the first step towards thwarting this attack.
Fichier non déposé

Dates et versions

hal-03570198 , version 1 (13-02-2022)

Identifiants

Citer

Yassine Boufenneche, Nawel Gharbi, Rafik Zitouni, Laurent George. Formal Modeling of Greedy Behavior in Secure Internet of Things Networks. 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), Jul 2019, Zagreb, Croatia. pp.188-193, ⟨10.1109/ICUFN.2019.8806168⟩. ⟨hal-03570198⟩
23 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More