Formal reconstruction of attack scenarios in mobile <it>ad hoc </it>and sensor networks

<p>Abstract</p> <p>Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile <it>Ad hoc </it>and Sensor Networks (MASNets). In this article, we...

Full description

Bibliographic Details
Main Authors: Rekhis Slim, Boudriga Noureddine
Format: Article
Language:English
Published: SpringerOpen 2011-01-01
Series:EURASIP Journal on Wireless Communications and Networking
Subjects:
Online Access:http://jwcn.eurasipjournals.com/content/2011/1/39
Description
Summary:<p>Abstract</p> <p>Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile <it>Ad hoc </it>and Sensor Networks (MASNets). In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid <it>ad hoc </it>generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.</p>
ISSN:1687-1472
1687-1499