Behavioural Modelling of WSN MAC Layer Security Attacks: A Sequential UML Approach.
Pranav M. PawarRasmus H. NielsenNeeli R. PrasadShingo OhmoriRamjee PrasadPublished in: J. Cyber Secur. Mobil. (2012)
Keyphrases
- medium access control
- mac layer
- physical layer
- security mechanisms
- wireless sensor networks
- routing protocol
- security protocols
- mac protocol
- key management
- resource constrained
- cross layer
- wireless networks
- wireless communication
- ad hoc networks
- network simulator
- wireless channels
- energy efficient
- energy consumption
- network security
- security issues
- multi hop
- access control
- quality of service
- information security
- sensor nodes
- network layer
- data transmission
- channel assignment
- intrusion detection
- network topology
- data streams
- resource utilization
- mobile nodes
- security requirements
- network management
- energy efficiency
- multi channel
- routing algorithm