DocumentCode :
616099
Title :
Protecting wireless sensor networks from internal attacks based on uncertain decisions
Author :
Xu Huang ; Ahmed, Md Raju ; Sharma, Divya ; Hongyan Cui
Author_Institution :
Fac. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT, Australia
fYear :
2013
fDate :
7-10 April 2013
Firstpage :
1854
Lastpage :
1859
Abstract :
A wireless sensor network (WSN) is a collection of self-organized nodes with limited computation and communication capabilities and energy covering deployed areas that interested by the controllers. It has been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions, as known as aware of environmental technologies such as sound, water contamination, temperature, pressure, motion and other pollutants. While wireless communication becomes all sectors of daily life, the security threats to WSNs become increasingly diversified, prevention based due to the open nature of the wireless medium. An adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited due to SWN´s natures. As an example, node compromised is another major problem of WSN security since it allows an adversary to enter inside the security perimeter of the network and launch attacks, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of WSNs with multi-hop and single sinker, by which we first present our novel protecting algorithm to WSNs with the evidences that our novel algorithm works efficiently and effectively. Our new algorithm is based on uncertain decisions, which involved in the posteriori probability of binary events represented by the beta family of density functions and Dempester Shafer theory (DST).
Keywords :
cryptography; decision theory; inference mechanisms; probability; telecommunication security; wireless sensor networks; DST; Dempester Shafer theory; WSN security problem; binary events; cryptographic methods; density functions; environmental technology; internal attacks; launch attacks; motion; pollutants; posteriori probability; pressure; security threats; self-organized node collection; sound; spatial distributed autonomous sensors; temperature; uncertain decision theory; water contamination; wireless communication; wireless medium; wireless sensor network protection; Cryptography; Equations; Mathematical model; Sensor phenomena and characterization; Wireless sensor networks; Dempester Shafer Theory; beta function; internal attacks; security of WSNs; sensor optimum deployment; wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications and Networking Conference (WCNC), 2013 IEEE
Conference_Location :
Shanghai
ISSN :
1525-3511
Print_ISBN :
978-1-4673-5938-2
Electronic_ISBN :
1525-3511
Type :
conf
DOI :
10.1109/WCNC.2013.6554846
Filename :
6554846
Link To Document :
بازگشت