Protecting wireless sensor networks from internal attacks based on uncertain decisions

A wireless sensor network (WSN) is a collection of self-organized nodes with limited computation and communication capabilities and energy covering deployed areas that interested by the controllers. It has been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions, as known as aware of environmental technologies such as sound, water contamination, temperature, pressure, motion and other pollutants. While wireless communication becomes all sectors of daily life, the security threats to WSNs become increasingly diversified, prevention based due to the open nature of the wireless medium. An adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited due to SWN's natures. As an example, node compromised is another major problem of WSN security since it allows an adversary to enter inside the security perimeter of the network and launch attacks, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of WSNs with multi-hop and single sinker, by which we first present our novel protecting algorithm to WSNs with the evidences that our novel algorithm works efficiently and effectively. Our new algorithm is based on uncertain decisions, which involved in the posteriori probability of binary events represented by the beta family of density functions and Dempester Shafer theory (DST).

[1]  Mm Momani,et al.  Bayesian methods for modelling and management of trust in wireless sensor networks , 2008 .

[2]  D. Stephens,et al.  Detection of moving radioactive sources using sensor networks , 2004, IEEE Transactions on Nuclear Science.

[3]  Hyuk Lim,et al.  J-Sim: a simulation and emulation environment for wireless sensor networks , 2006, IEEE Wireless Communications.

[4]  Feng Zhao Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[5]  Christos Gkantsidis,et al.  Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[6]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[7]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[8]  Xu Huang,et al.  A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks , 2011, 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing.

[9]  Xu Huang,et al.  Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.

[10]  Bruno Sinopoli,et al.  Distributed control applications within sensor networks , 2003, Proc. IEEE.

[11]  Balasubramaniam Natarajan,et al.  Optimal Control-Based Strategy for Sensor Deployment , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[12]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[13]  Kamal Jain,et al.  Signatures for Network Coding , 2006 .

[14]  Chung-Kuo Chang,et al.  An application of sensor networks for syndromic surveillance , 2005, Proceedings. 2005 IEEE Networking, Sensing and Control, 2005..

[15]  Reza Curtmola,et al.  Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.

[16]  Xu Huang,et al.  Fuzzy controlling window for elliptic curve cryptography in wireless networks , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[17]  Pavan Sikka,et al.  Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[18]  Fabrice Valois,et al.  Resiliency of wireless sensor networks: Definitions and analyses , 2010, 2010 17th International Conference on Telecommunications.

[19]  Pritam Gajkumar Shah,et al.  Multi-Agent System Protecting from Attacking with Elliptic Curve Cryptography , 2010 .

[20]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[21]  Matt Welsh,et al.  Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.

[22]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[23]  Dharmendra Sharma,et al.  Accuracy of Location Identification with Antenna Polarization on RSSI , 2009 .

[24]  Yong Guan,et al.  An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.