ABSTRACT
Wireless sensor networks (WSNs) are playing a vital role in collecting data about a natural or built environment. WSNs have attractive advantages such as low-cost, low maintains and flexible arrangements for applications. Wireless sensor network has been used for many different applications such as military implementations in a battlefield, an environmental monitoring, and multifunction in health sector. In order to ensure its functionality, especially in malicious environments, security mechanisms become essential. Especially internal attacks have gained prominence and pose most challenging threats to all WSNs. Although, a number of works have been done to discuss a WSN under the internal attacks it has gained little attention. For example, the conventional cryptographic technique does not give the appropriated security to save the network from internal attack that causes by abnormally behaviour at the legitimate nodes in a network. In this paper, we propose an effective algorithm to make an evaluation for detecting internal attack by multi-criteria in real time. This protecting is based on the combination of the multiple pieces of evidences collected from the nodes under an internal attacker in a network. A theory of the decision is carefully discussed based on the Dempster-Shafer Theory (DST). If you really wanted to make sure the designed network works exactly works as you expected, you will be benefited from this algorithm. The advantage of this proposed method is not just its performance in real-time but also it is effective as it does not need the knowledge about the normal or malicious node in advance with very high average accuracy that is close to 100%. It also can be used as one of maintaining tools for the regulations of the deployed WSNs.
- Huang X, Ahmed M, Sharma D, "Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks", IEEE, ICOIN 2012, Bali, Indonesia, February 2012. Google ScholarDigital Library
- Ahmed M., Hunag X., Sharma D., "A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks", ICIS 2012, Kuala Lumpur, Malaysia 2012Google Scholar
- M. R. Ahmed, X. Huang, and D. Sharma, "A Taxonomy of internal attacks in Wireless Sensor Networks", IEEE, ICIS 2012, Malaysia February (19--21), 2012. Pp427--430. 2012Google Scholar
- O. Erdene-Ochir, M. Mibier, F. Valois and A. Kountouris, "Resiliency of wireless sensor networks: definitions and analyses," 2010 17th International Conference on Telecommunications. Pp- 828--835. 2010.Google Scholar
- J. Staddon, D. Balfanz, and G. Durfee, "Efficient tracing of failed nodes in sensor networks," in WSNA 2002, pp. 122--130, Atlanta, USA. 2002 Google ScholarDigital Library
- S. Marti, T. J. Giuli, K. Lai, M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," ACM MOBICOM 2000, pp. 255--265, Boston, USA, August 2000 Google ScholarDigital Library
- Y. Zhang, W. Lee, "Intrusion Detection in Wireless Ad-hoc Networks," ACM MOBICOM 2000, pp. 275--283, Boston, USA, August 2000.Google Scholar
- C. Holder, R. Boyles, P. Robinson, S. Raman, and G. Fishel, "Calculating a daily Normal temperature range that reflects daily temperature variability", American Meteorological Society, June 2006.Google ScholarCross Ref
- W. T. Zhu, Y. Xiang, J. Zhou, R. H. Deng, and F. Bao, "Secure localization with attack detection in wireless sensor networks," International Journal of Information Security, vol. 10, no. 3, pp. 155--171, 2011. Google ScholarDigital Library
- K. Sentz, "Combination of Evidence in Dempster-Shafer Theory", System Science and Engineering Department, Binghamton University, SAND 2002-0835, April 2002Google Scholar
- D. Koks, S. Challa, "An Introduction to Bayesian and Dempster-Shafer Data Fusion", Published by DSTO Systems Sciences Laboratory, Australia, November 2005Google Scholar
- M. Tabassian, R. Ghaderi, R. Ebrahimpour, "Combination of multiple diverse classifiers using belief functions for handling data with imperfect labels" Expert Systems with Applications 39, Elsevier 2011 Google ScholarDigital Library
- F. Khalaja, M. Khalajb, A. H. Khalaj, "Bounded Error for Robust Fault Detection under Uncertainty, Part 1: Proposed Model Using Dempster-Shafer Theory", Journal of Basic and Applied Scientific Research, 2(2)1233--1240, ISSN 2090-4304 2012Google Scholar
Index Terms
- Effective algorithm for protecting WSNs from internal attacks in real-time
Recommendations
A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN
TRUSTCOM '13: Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and CommunicationsWireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering ...
Wireless sensor network internal attacker identification with multiple evidence by dempster-shafer theory
ICA3PP'12: Proceedings of the 12th international conference on Algorithms and Architectures for Parallel Processing - Volume Part IIWireless sensor Network (WSN) is known to be vulnerable to variety of attacks due to the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are ...
A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks
EUC '11: Proceedings of the 2011 IFIP 9th International Conference on Embedded and Ubiquitous ComputingWireless sensor networks (WSNs) are composed of large number of low cost, low power and cooperatively collect the environmental information and realize the integration of the physical world and communication network. Due to open nature of the wireless ...
Comments