• DocumentCode
    2557698
  • Title

    Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks

  • Author

    Rekhis, Slim ; Boudriga, Noureddine

  • Author_Institution
    CN&S Res. Lab., Univ. of the 7th of November at Carthage, Carthage, Tunisia
  • fYear
    2009
  • fDate
    12-14 Oct. 2009
  • Firstpage
    1
  • Lastpage
    8
  • Abstract
    We introduce in this paper the concept, generation, and usage of security attack patterns as a valuable technique for conducting digital investigation. A formal approach based on the use of these patterns is introduced for the reconstruction of potential attack scenarios and characterizing provable properties and actions. To exemplify the proposal, a case study dealing with investigation on wormhole attacks is provided.
  • Keywords
    ad hoc networks; security of data; wireless sensor networks; pattern-based digital investigation; wireless adhoc networks; wireless sensor networks; wormhole attacks; x-hole attacks; Availability; Clocks; Communication system security; Image reconstruction; Information analysis; Information security; Logic; Proposals; Testing; Wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Ultra Modern Telecommunications & Workshops, 2009. ICUMT '09. International Conference on
  • Conference_Location
    St. Petersburg
  • Print_ISBN
    978-1-4244-3942-3
  • Electronic_ISBN
    978-1-4244-3941-6
  • Type

    conf

  • DOI
    10.1109/ICUMT.2009.5345388
  • Filename
    5345388