DocumentCode
2557698
Title
Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks
Author
Rekhis, Slim ; Boudriga, Noureddine
Author_Institution
CN&S Res. Lab., Univ. of the 7th of November at Carthage, Carthage, Tunisia
fYear
2009
fDate
12-14 Oct. 2009
Firstpage
1
Lastpage
8
Abstract
We introduce in this paper the concept, generation, and usage of security attack patterns as a valuable technique for conducting digital investigation. A formal approach based on the use of these patterns is introduced for the reconstruction of potential attack scenarios and characterizing provable properties and actions. To exemplify the proposal, a case study dealing with investigation on wormhole attacks is provided.
Keywords
ad hoc networks; security of data; wireless sensor networks; pattern-based digital investigation; wireless adhoc networks; wireless sensor networks; wormhole attacks; x-hole attacks; Availability; Clocks; Communication system security; Image reconstruction; Information analysis; Information security; Logic; Proposals; Testing; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Ultra Modern Telecommunications & Workshops, 2009. ICUMT '09. International Conference on
Conference_Location
St. Petersburg
Print_ISBN
978-1-4244-3942-3
Electronic_ISBN
978-1-4244-3941-6
Type
conf
DOI
10.1109/ICUMT.2009.5345388
Filename
5345388
Link To Document