DocumentCode :
2665940
Title :
A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks
Author :
Huang, Xu ; Ahmed, Muhammad ; Sharma, Dharmendra
Author_Institution :
Fac. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT, Australia
fYear :
2011
fDate :
24-26 Oct. 2011
Firstpage :
344
Lastpage :
349
Abstract :
Wireless sensor networks (WSNs) are composed of large number of low cost, low power and cooperatively collect the environmental information and realize the integration of the physical world and communication network. Due to open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks. However, node compromise is another major problem of WSN security due to it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks, by which we show our novel algorithm that under some fixed parameters designed by the network designer, we can have reasonable model for predicting the highest signal noise ratio (S/N). Therefore we may allow the sinker to be open only around that particular time period to receive the signals from the sources while the other time slots are in "sleeping state" to ignore any signals, including the internal attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for the fixed network. We can easily manipulate the sending rate to control the time of the highest S/N to protect "internal attacks." The simulations results have been shown to underpin our novel algorithm.
Keywords :
telecommunication security; wireless sensor networks; WSN security; environmental information; internal attack protection; internal attacks; sleeping state; wireless media; wireless sensor networks; Cryptography; Mathematical model; Noise; Sensors; Simulation; Wireless communication; Wireless sensor networks; internal attacks; network security; sensor optimum deployment; wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Embedded and Ubiquitous Computing (EUC), 2011 IFIP 9th International Conference on
Conference_Location :
Melbourne, VIC
Print_ISBN :
978-1-4577-1822-9
Type :
conf
DOI :
10.1109/EUC.2011.8
Filename :
6104548
Link To Document :
بازگشت