• DocumentCode
    652227
  • Title

    A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN

  • Author

    Ahmed, Md Raju ; Xu Huang ; Hongyan Cui

  • Author_Institution
    Fac. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT, Australia
  • fYear
    2013
  • fDate
    16-18 July 2013
  • Firstpage
    688
  • Lastpage
    693
  • Abstract
    Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack\´s node behavioral pattern is different from the other neighbors, called "good nodes," in a system even neighbor nodes can be attacked. In this paper, we use Dempster-Shafer theory (DST) of combined multiple evidences to identify the malicious or internal attacks in a WSN. Moreover, it gives a numerical procedure for fusing together multiple pieces of evidences from unreliable neighbor with higher degree of conflict reliability.
  • Keywords
    computer network security; inference mechanisms; radio links; wireless sensor networks; DST; Dempster-Shafer theory; WSN security; application driven technology; distributed network infrastructure; emergency response; environmental monitoring; evidential evaluation; health sector; information gathering; information processing; internal attack; low-cost resources constrain nodes; military implementation; multifunctional resource constrain node; surveillance; wireless link; wireless sensor network; Cryptography; Equations; Mathematical model; Peer-to-peer computing; Temperature measurement; Wireless sensor networks; Dempster-shafer Theory; Security; Wireless Sensor Network (WSN); internal attacks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
  • Conference_Location
    Melbourne, VIC
  • Type

    conf

  • DOI
    10.1109/TrustCom.2013.276
  • Filename
    6680903