Skip to main navigation Skip to search Skip to main content

Petri-net-based modeling and resolving of black hole attack in WMN

  • Hejiao Huang*
  • , Qiang Zhou
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

As Wireless Mesh network (WMN) is self-organizing, self-adaptive, low-cost and multi-hop, it has gradually become one of the next generation wireless networks for communication. The routing security is an important aspect of WMN. Once the routing protocol is under attack, other security measures of WMN become meaningless. Hence, detecting and resolving the attack for routing protocol is significant. This paper focuses on the modeling and resolving of the black hole attack in WMN based on colored Petri net (CPN). Firstly, WMN routing protocol is modeled with a CPN. By analyzing the model, whether a black hole attack exists can be detected. Then, in the case a black hole attack exists, a strategy for avoiding the attack is presented. Comparing to other formal methods, CPN provides a graphical representation of the protocol, and there exists a large variety of simulation tools and mathematical methods for analysis. To the best of our knowledge, it is the first time that colored Petri net is applied to handle the security issue in Wireless Mesh Networks.

Original languageEnglish
Title of host publicationProceedings - 36th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 2012
Pages409-414
Number of pages6
DOIs
StatePublished - 2012
Externally publishedYes
Event36th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 2012 - Izmir, Turkey
Duration: 16 Jul 201220 Jul 2012

Publication series

NameProceedings - International Computer Software and Applications Conference
ISSN (Print)0730-3157

Conference

Conference36th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 2012
Country/TerritoryTurkey
CityIzmir
Period16/07/1220/07/12

Keywords

  • Black hole attack
  • Colored petri net
  • Security verification

Fingerprint

Dive into the research topics of 'Petri-net-based modeling and resolving of black hole attack in WMN'. Together they form a unique fingerprint.

Cite this