DocumentCode :
652227
Title :
A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN
Author :
Ahmed, Md Raju ; Xu Huang ; Hongyan Cui
Author_Institution :
Fac. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT, Australia
fYear :
2013
fDate :
16-18 July 2013
Firstpage :
688
Lastpage :
693
Abstract :
Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack\´s node behavioral pattern is different from the other neighbors, called "good nodes," in a system even neighbor nodes can be attacked. In this paper, we use Dempster-Shafer theory (DST) of combined multiple evidences to identify the malicious or internal attacks in a WSN. Moreover, it gives a numerical procedure for fusing together multiple pieces of evidences from unreliable neighbor with higher degree of conflict reliability.
Keywords :
computer network security; inference mechanisms; radio links; wireless sensor networks; DST; Dempster-Shafer theory; WSN security; application driven technology; distributed network infrastructure; emergency response; environmental monitoring; evidential evaluation; health sector; information gathering; information processing; internal attack; low-cost resources constrain nodes; military implementation; multifunctional resource constrain node; surveillance; wireless link; wireless sensor network; Cryptography; Equations; Mathematical model; Peer-to-peer computing; Temperature measurement; Wireless sensor networks; Dempster-shafer Theory; Security; Wireless Sensor Network (WSN); internal attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
Type :
conf
DOI :
10.1109/TrustCom.2013.276
Filename :
6680903
Link To Document :
بازگشت