Title :
Protecting from Inside Attacks in Wireless Sensor Networks
Author :
Huang, Xu ; Ahmed, Muhammad ; Sharma, Dharmendra
Author_Institution :
Fac. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT, Australia
Abstract :
Wireless sensor networks (WSNs) are widely used. They are easily and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. However, for most WSNss the open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some such attacks. But the inside attacks are not detectable with only the classic cryptographic techniques. These attacks mainly include node compromise which is another major problem for WSN security. This allows an adversary to enter inside the security perimeter of the network which raises a serious challenge for WSNs. This paper focusses on investigating inside attacks of WSNs. We show our novel method works well for security under some fixed parameters designed by the network designer. We can also reasonabley predict the highest signal noise ratio (S/N). This method controls the sinker node with period sleeping time period for protecting inside attacks in WSNss. Therefore we may allow a sinker to be open only around a particular time period to receive the signals from the sources while the other time slots are in "sleeping state" to ignore any signals, including the inside attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for a fixed network. We can manipulate the sending rate to control the time when the highest S/N is occurring to protect from "inside attacks". The simulation results from our novel algorithm are promising.
Keywords :
cryptography; sensor placement; telecommunication security; wireless sensor networks; WSN; communication network protection; cryptography; inside attacks; network security; period sleeping time period; sensor deployment; signal noise ratio; sinker node control; wireless sensor networks; Cryptography; Mathematical model; Noise; Simulation; Wireless communication; Wireless sensor networks; inside attacks; network security; sensor optimum deployment; wireless sensor networks;
Conference_Titel :
Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on
Conference_Location :
Sydney, NSW
Print_ISBN :
978-1-4673-0006-3
DOI :
10.1109/DASC.2011.52