• DocumentCode
    616099
  • Title

    Protecting wireless sensor networks from internal attacks based on uncertain decisions

  • Author

    Xu Huang ; Ahmed, Md Raju ; Sharma, Divya ; Hongyan Cui

  • Author_Institution
    Fac. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT, Australia
  • fYear
    2013
  • fDate
    7-10 April 2013
  • Firstpage
    1854
  • Lastpage
    1859
  • Abstract
    A wireless sensor network (WSN) is a collection of self-organized nodes with limited computation and communication capabilities and energy covering deployed areas that interested by the controllers. It has been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions, as known as aware of environmental technologies such as sound, water contamination, temperature, pressure, motion and other pollutants. While wireless communication becomes all sectors of daily life, the security threats to WSNs become increasingly diversified, prevention based due to the open nature of the wireless medium. An adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited due to SWN´s natures. As an example, node compromised is another major problem of WSN security since it allows an adversary to enter inside the security perimeter of the network and launch attacks, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of WSNs with multi-hop and single sinker, by which we first present our novel protecting algorithm to WSNs with the evidences that our novel algorithm works efficiently and effectively. Our new algorithm is based on uncertain decisions, which involved in the posteriori probability of binary events represented by the beta family of density functions and Dempester Shafer theory (DST).
  • Keywords
    cryptography; decision theory; inference mechanisms; probability; telecommunication security; wireless sensor networks; DST; Dempester Shafer theory; WSN security problem; binary events; cryptographic methods; density functions; environmental technology; internal attacks; launch attacks; motion; pollutants; posteriori probability; pressure; security threats; self-organized node collection; sound; spatial distributed autonomous sensors; temperature; uncertain decision theory; water contamination; wireless communication; wireless medium; wireless sensor network protection; Cryptography; Equations; Mathematical model; Sensor phenomena and characterization; Wireless sensor networks; Dempester Shafer Theory; beta function; internal attacks; security of WSNs; sensor optimum deployment; wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless Communications and Networking Conference (WCNC), 2013 IEEE
  • Conference_Location
    Shanghai
  • ISSN
    1525-3511
  • Print_ISBN
    978-1-4673-5938-2
  • Electronic_ISBN
    1525-3511
  • Type

    conf

  • DOI
    10.1109/WCNC.2013.6554846
  • Filename
    6554846