A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks

Despite extensive study on wireless sensor network security, defending internal attacks and finding ab normal behaviour of the sensor are still difficult and unsolved task . The conventional cryptographic technique does not give the robust se curity or detection process to save the network from internal attacker that cause by abnormal behavior. The insider attacker or abnorma lly behaved sensor identificationand location detection framewo rk using false massage detection and Time difference of Arrival (T DoA) is presented in this paper. It has been shown that the new framework can efficiently identify and detect the insider att acker location so that the attacker can be reprogrammed or subside from th e network to save from internal attack . Keywords—Insider Attaker identification, Abnormal Behaviour, Location detection, Time difference of Arrival (TDo A), Wireless sensor network

[1]  Avinash Srinivasan,et al.  Wireless Sensor Networks (WSNs): Secure Localization , 2012 .

[2]  Jie Wu,et al.  A Survey on Secure Localization in Wireless Sensor Networks , 2007 .

[3]  Youssef Chraibi Localization in Wireless Sensor Networks , 2005 .

[4]  H. C. Schau,et al.  Passive source localization employing intersecting spherical surfaces from time-of-arrival differences , 1987, IEEE Trans. Acoust. Speech Signal Process..

[5]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[6]  Myong-Soon Park,et al.  Inside Attacker Detection in Hierarchical Wireless Sensor Network , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[7]  Sartaj Sahni,et al.  A computational geometry method for DTOA triangulation , 2007, 2007 10th International Conference on Information Fusion.

[8]  Don J. Torrieri,et al.  Statistical Theory of Passive Location Systems , 1984, IEEE Transactions on Aerospace and Electronic Systems.

[9]  Robert H. Deng,et al.  Secure localization with attack detection in wireless sensor networks , 2011, International Journal of Information Security.

[10]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[11]  J. Smith,et al.  The spherical interpolation method for closed-form passive source localization using range difference measurements , 1987, ICASSP '87. IEEE International Conference on Acoustics, Speech, and Signal Processing.

[12]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[13]  Junyu Niu,et al.  Implicit Security Authentication Scheme in Wireless Sensor Networks , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[14]  Suprakash Datta,et al.  Localization in wireless sensor networks , 2007, IPSN.

[15]  W. Foy Solutions by Taylor-Series Estimation , 1976 .

[16]  Donggang Liu,et al.  Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[17]  B. Friedlander A passive localization algorithm and its accuracy analysis , 1987 .

[18]  J. Smith,et al.  The spherical interpolation method of source localization , 1987 .

[19]  Radha Poovendran,et al.  HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.