Research Article

From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

Algorithm 9

Intruder() =
  //sends to CU messages by pretending to be a legitimate sensor node
  ca!ID.(No.RandLoc()).CU_1 -> Intruder()
  ca!ID.(No.RandLoc()).CU_2 -> Intruder()
  //intercept messages from the channel
  ca?ID_.Loc_.ID_ -> Intruder()
  cb?ID_.Loc_.ID_ -> Intruder()