skip to main content
10.1145/2843043.2843351acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesaus-cswConference Proceedingsconference-collections
research-article

Effective algorithm for protecting WSNs from internal attacks in real-time

Authors Info & Claims
Published:01 February 2016Publication History

ABSTRACT

Wireless sensor networks (WSNs) are playing a vital role in collecting data about a natural or built environment. WSNs have attractive advantages such as low-cost, low maintains and flexible arrangements for applications. Wireless sensor network has been used for many different applications such as military implementations in a battlefield, an environmental monitoring, and multifunction in health sector. In order to ensure its functionality, especially in malicious environments, security mechanisms become essential. Especially internal attacks have gained prominence and pose most challenging threats to all WSNs. Although, a number of works have been done to discuss a WSN under the internal attacks it has gained little attention. For example, the conventional cryptographic technique does not give the appropriated security to save the network from internal attack that causes by abnormally behaviour at the legitimate nodes in a network. In this paper, we propose an effective algorithm to make an evaluation for detecting internal attack by multi-criteria in real time. This protecting is based on the combination of the multiple pieces of evidences collected from the nodes under an internal attacker in a network. A theory of the decision is carefully discussed based on the Dempster-Shafer Theory (DST). If you really wanted to make sure the designed network works exactly works as you expected, you will be benefited from this algorithm. The advantage of this proposed method is not just its performance in real-time but also it is effective as it does not need the knowledge about the normal or malicious node in advance with very high average accuracy that is close to 100%. It also can be used as one of maintaining tools for the regulations of the deployed WSNs.

References

  1. Huang X, Ahmed M, Sharma D, "Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks", IEEE, ICOIN 2012, Bali, Indonesia, February 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ahmed M., Hunag X., Sharma D., "A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks", ICIS 2012, Kuala Lumpur, Malaysia 2012Google ScholarGoogle Scholar
  3. M. R. Ahmed, X. Huang, and D. Sharma, "A Taxonomy of internal attacks in Wireless Sensor Networks", IEEE, ICIS 2012, Malaysia February (19--21), 2012. Pp427--430. 2012Google ScholarGoogle Scholar
  4. O. Erdene-Ochir, M. Mibier, F. Valois and A. Kountouris, "Resiliency of wireless sensor networks: definitions and analyses," 2010 17th International Conference on Telecommunications. Pp- 828--835. 2010.Google ScholarGoogle Scholar
  5. J. Staddon, D. Balfanz, and G. Durfee, "Efficient tracing of failed nodes in sensor networks," in WSNA 2002, pp. 122--130, Atlanta, USA. 2002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Marti, T. J. Giuli, K. Lai, M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," ACM MOBICOM 2000, pp. 255--265, Boston, USA, August 2000 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y. Zhang, W. Lee, "Intrusion Detection in Wireless Ad-hoc Networks," ACM MOBICOM 2000, pp. 275--283, Boston, USA, August 2000.Google ScholarGoogle Scholar
  8. C. Holder, R. Boyles, P. Robinson, S. Raman, and G. Fishel, "Calculating a daily Normal temperature range that reflects daily temperature variability", American Meteorological Society, June 2006.Google ScholarGoogle ScholarCross RefCross Ref
  9. W. T. Zhu, Y. Xiang, J. Zhou, R. H. Deng, and F. Bao, "Secure localization with attack detection in wireless sensor networks," International Journal of Information Security, vol. 10, no. 3, pp. 155--171, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Sentz, "Combination of Evidence in Dempster-Shafer Theory", System Science and Engineering Department, Binghamton University, SAND 2002-0835, April 2002Google ScholarGoogle Scholar
  11. D. Koks, S. Challa, "An Introduction to Bayesian and Dempster-Shafer Data Fusion", Published by DSTO Systems Sciences Laboratory, Australia, November 2005Google ScholarGoogle Scholar
  12. M. Tabassian, R. Ghaderi, R. Ebrahimpour, "Combination of multiple diverse classifiers using belief functions for handling data with imperfect labels" Expert Systems with Applications 39, Elsevier 2011 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. F. Khalaja, M. Khalajb, A. H. Khalaj, "Bounded Error for Robust Fault Detection under Uncertainty, Part 1: Proposed Model Using Dempster-Shafer Theory", Journal of Basic and Applied Scientific Research, 2(2)1233--1240, ISSN 2090-4304 2012Google ScholarGoogle Scholar

Index Terms

  1. Effective algorithm for protecting WSNs from internal attacks in real-time

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ACSW '16: Proceedings of the Australasian Computer Science Week Multiconference
      February 2016
      654 pages
      ISBN:9781450340427
      DOI:10.1145/2843043

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 February 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      ACSW '16 Paper Acceptance Rate77of172submissions,45%Overall Acceptance Rate204of424submissions,48%
    • Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader