Formalism of security properties for battlefield surveillance system

In battlefield, autonomous and complex environment influence the use of Wireless Sensor and Actor Networks (WSANs) because of their sensing and decision making capability. Security is a critical issue in battlefield therefore this work is focused on implementation of four basic properties, i.e., authentication, authorization, confidentiality and integrity. At first, the proposed model is represented using graph theory. Weighted graph is used because of adding weights at the edges to enrich the network topology supporting searching and finding shortest path operations. Based on the graph model, an algorithm is developed for securing communication among the legal participants in the battlefield. The proposed algorithm is then transformed into an equivalent static formal model using Vienna Development Method-Specification Language (VDM-SL). The security properties are described and implemented based on the resultant model. The invariants are used on the data types and pre/post conditions are used on the functions and operations preventing the system to enter into an unwanted situation. Formal methods are used here to overcome the limitations of simulations and testing techniques. The developed formal model is validated, verified and analyzed through various facilities available in the VDM-SL Toolbox.

[1]  Peter Gorm Larsen,et al.  VDMTools: advances in support for formal modeling in VDM , 2008, SIGP.

[2]  Nick Battle,et al.  The overture initiative integrating tools for VDM , 2010, ACM SIGSOFT Softw. Eng. Notes.

[3]  Nazir Ahmad Zafar,et al.  Towards Formalism of Earthquake Detection and Disaster Reduction Using WSANs , 2016, 2016 International Conference on Frontiers of Information Technology (FIT).

[4]  Nazir Ahmad Zafar,et al.  Battlefield surveillance formalism using WSANs , 2017, 2017 International Conference on Electrical Engineering (ICEE).

[5]  Ping Sun,et al.  Design Proposal of Self-Powered WSN Node for Battle Field Surveillance , 2012 .

[6]  Najem Moussa,et al.  Agent-based system simulation of wireless battlefield networks , 2016, Comput. Electr. Eng..

[7]  Nazir Ahmad Zafar,et al.  Formalism of network restructuring in Flood Control System , 2017, 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT).

[8]  Nazir Ahmad Zafar,et al.  Cloud computing based flood detection and management system using WSANs , 2016, 2016 International Conference on Emerging Technologies (ICET).

[9]  William Scanlon,et al.  Millimeter-wave stealth radio for special operations forces , 2010 .

[10]  Athanasios V. Vasilakos,et al.  Formal verification and validation of a movement control actor relocation algorithm for safety–critical applications , 2016, Wirel. Networks.

[11]  Baochun Li,et al.  Efficient and guaranteed service coverage in partitionable mobile ad-hoc networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[12]  Muhammad Imran,et al.  International Conference on Emerging Ubiquitous Systems and Pervasive Networks ( EUSPN 2015 ) Formalizing Mobile Ad Hoc and Sensor Networks using VDM-SL , 2015 .

[13]  Raheem A. Beyah,et al.  Designing Secure Protocols for Wireless Sensor Networks , 2008, WASA.

[14]  Rathanakar Acharya,et al.  Data integrity and intrusion detection in Wireless Sensor Networks , 2008, 2008 16th IEEE International Conference on Networks.

[15]  Nazir Ahmad Zafar,et al.  Algorithm and Formal Model of Recovering Network Connectivity in Battlefield Surveillance , 2018, IoT 2018.

[16]  Sana Ullah,et al.  Formal Specification and Validation of a Localized Algorithm for Segregation of Critical/Noncritical Nodes in MAHSNs , 2014, Int. J. Distributed Sens. Networks.

[17]  Muhammad Imran,et al.  Formal Specification and Validation of a Hybrid Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks , 2012, Sensors.

[18]  Nazir Ahmad Zafar,et al.  Robot-based forest fire detection and extinguishing model , 2016, 2016 2nd International Conference on Robotics and Artificial Intelligence (ICRAI).

[19]  Hobart R. Everett,et al.  Third-generation security robot , 1997, Optics East.

[20]  Eric Krotkov,et al.  The Defense Advanced Research Projects Agency (DARPA) Tactical Mobile Robotics Program , 1999, Int. J. Robotics Res..