Security attacks in wireless sensor networks: A survey

P Dewal, GS Narula, V Jain, A Baliyan - Cyber Security: Proceedings of …, 2018 - Springer
Security is one of the major concerns in sensor networks. Wireless sensor network
comprises of huge amount of nodes called as tiny sensor nodes. The nodes are required to …

Design and analysis of a generalized canvas protocol

M Novotný - IFIP International Workshop on Information Security …, 2010 - Springer
The Canvas protocol was developed by Harald Vogt [10] and should provide data integrity in
Wireless Sensor Networks. However, Dieter Gollmann published [5] an attack on the …

A novel robust routing protocol RAEED to avoid DoS attacks in WSN

SU Maheswari, NS Usha, EAM Anita… - 2016 International …, 2016 - ieeexplore.ieee.org
Many of the WSN routing protocols are vulnerable to DoS attack such as Hello Flood Attack,
Sink hole and Black hole attack etc. In this paper, we are principally focus on one attack …

Analysis of LEACH protocol (s) using formal verification

A Ihsan, K Saghar, T Fatima - 2015 12th International Bhurban …, 2015 - ieeexplore.ieee.org
WSN nodes operate in an unattended environment and thus have irreplaceable batteries.
Thus an important concern is the network lifetime; we need to utilize their energy for a longer …

Slede: a domain-specific verification framework for sensor network security protocol implementations

Y Hanna, H Rajan, W Zhang - Proceedings of the first ACM conference …, 2008 - dl.acm.org
Finding flaws in security protocol implementations is hard. Finding flaws in the
implementations of sensor network security protocols is even harder because they are …

Formal modelling of a robust wireless sensor network routing protocol

K Saghar, W Henderson, D Kendall… - 2010 NASA/ESA …, 2010 - ieeexplore.ieee.org
Because of their low cost, small size, low resources and self-organizing nature a Wireless
Sensor Network (WSN) is a potential solution in hostile environments including military …

Raeed: A solution for hello flood attack

K Saghar, D Kendall… - 2015 12th International …, 2015 - ieeexplore.ieee.org
Hello flood attack has long been a problem in ad-hoc and wireless networks during data
routing. Although numerous solutions have been proposed, they all have drawbacks. The …

RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network

K Saghar, M Tariq, D Kendall… - 2016 13th International …, 2016 - ieeexplore.ieee.org
Denial of Services (DoS) attacks has long been a problem in ad-hoc and wireless networks
during data routing. The aim of DoS attacks is to disrupt the routing and prevent data …

Towards verifying correctness of wireless sensor network applications using insense and spin

O Sharma, J Lewis, A Miller, A Dearle… - … Checking Software: 16th …, 2009 - Springer
The design and implementation of wireless sensor network applications often require
domain experts, who may lack expertise in software engineering, to produce resource …

Achieving energy efficiency through load balancing: A comparison through formal verification of two WSN routing protocols

NA Khan, K Saghar, R Ahmad… - 2016 13th International …, 2016 - ieeexplore.ieee.org
Network lifetime is one of the most crucial factors that affect the performance of a Wireless
Sensor Network (WSN). In order to maximize the network lifetime, it is essential that a routing …