Malicious node detection for the future network security from epistemic uncertainties

The next generation of WSN will benefit when sensor data is added to blogs, virtual communities, and social network applications. Wireless sensor networks (WSNs) are popular now as distributed networks exposed to an open environment, collecting of self-organized nodes with limited computation and communication capabilities and energy covering deployed areas that interested by the controllers. WSNs have been as aware of environmental technologies such as sound, water contamination, temperature, pressure, motion and other pollutants. However, as wireless communication becomes all sectors of daily life, the security threats to WSNs become increasingly diversified, prevention based due to the open nature of the wireless medium. The node in a WSN is called compromised becomes another major problem of WSN security because it allows an adversary to enter inside the security perimeter of the network and launch attacks, which has raised a serious challenge for WSNs. This paper is focusing on investigating integrating wireless sensor networks with cloud computing with the case that internal attacks of WSNs with multi-hop and single sinker for the future network, such as compromised nodes in a deployed WSN, where we first present our novel protecting algorithm to WSN to protect it with the evidences that our novel algorithm works efficiently and effectively. Our new algorithm takes advantages from uncertain decisions, which means there is no need to know the structure before we check the network. It is involved in the posteriori probability of binary events represented by the beta family of density functions and Dempester Shafer theory (DST). AS it has no need to have any knowledge about the structure of the network, it will be flexible to use in real life.

[1]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[2]  Pavan Sikka,et al.  Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[3]  D. Stephens,et al.  Detection of moving radioactive sources using sensor networks , 2004, IEEE Transactions on Nuclear Science.

[4]  Bruno Sinopoli,et al.  Distributed control applications within sensor networks , 2003, Proc. IEEE.

[5]  Christos Gkantsidis,et al.  Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[6]  Reza Curtmola,et al.  Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.

[7]  Mm Momani,et al.  Bayesian methods for modelling and management of trust in wireless sensor networks , 2008 .

[8]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[9]  Xu Huang,et al.  Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.

[10]  Hyuk Lim,et al.  J-Sim: a simulation and emulation environment for wireless sensor networks , 2006, IEEE Wireless Communications.

[11]  Matt Welsh,et al.  Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.

[12]  Xu Huang,et al.  Fuzzy controller for a dynamic window in elliptic curve cryptography wireless networks for scalar multiplication , 2010, 2010 16th Asia-Pacific Conference on Communications (APCC).

[13]  Yong Guan,et al.  An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[14]  Feng Zhao Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[15]  Fabrice Valois,et al.  Resiliency of wireless sensor networks: Definitions and analyses , 2010, 2010 17th International Conference on Telecommunications.

[16]  Pritam Gajkumar Shah,et al.  Multi-Agent System Protecting from Attacking with Elliptic Curve Cryptography , 2010 .

[17]  Dharmendra Sharma,et al.  Accuracy of Location Identification with Antenna Polarization on RSSI , 2009 .

[18]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[19]  Kamal Jain,et al.  Signatures for Network Coding , 2006 .

[20]  Balasubramaniam Natarajan,et al.  Optimal Control-Based Strategy for Sensor Deployment , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[21]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[22]  Xu Huang,et al.  A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks , 2011, 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing.