A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks

Wireless sensor networks (WSNs) are composed of large number of low cost, low power and cooperatively collect the environmental information and realize the integration of the physical world and communication network. Due to open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks. However, node compromise is another major problem of WSN security due to it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks, by which we show our novel algorithm that under some fixed parameters designed by the network designer, we can have reasonable model for predicting the highest signal noise ratio (S/N). Therefore we may allow the sinker to be open only around that particular time period to receive the signals from the sources while the other time slots are in "sleeping state" to ignore any signals, including the internal attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for the fixed network. We can easily manipulate the sending rate to control the time of the highest S/N to protect "internal attacks." The simulations results have been shown to underpin our novel algorithm.

[1]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[2]  Bruno Sinopoli,et al.  Distributed control applications within sensor networks , 2003, Proc. IEEE.

[3]  Kamal Jain,et al.  Signatures for Network Coding , 2006 .

[4]  Hyuk Lim,et al.  J-Sim: a simulation and emulation environment for wireless sensor networks , 2006, IEEE Wireless Communications.

[5]  Fabrice Valois,et al.  Resiliency of wireless sensor networks: Definitions and analyses , 2010, 2010 17th International Conference on Telecommunications.

[6]  Pritam Gajkumar Shah,et al.  Multi-Agent System Protecting from Attacking with Elliptic Curve Cryptography , 2010 .

[7]  Yong Guan,et al.  An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[8]  D. Stephens,et al.  Detection of moving radioactive sources using sensor networks , 2004, IEEE Transactions on Nuclear Science.

[9]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[10]  Chung-Kuo Chang,et al.  An application of sensor networks for syndromic surveillance , 2005, Proceedings. 2005 IEEE Networking, Sensing and Control, 2005..

[11]  Reza Curtmola,et al.  Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.

[12]  Matt Welsh,et al.  Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.

[13]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[14]  Balasubramaniam Natarajan,et al.  Optimal Control-Based Strategy for Sensor Deployment , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[15]  Xu Huang,et al.  Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.

[16]  Xu Huang,et al.  Fuzzy controlling window for elliptic curve cryptography in wireless networks , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[17]  Pavan Sikka,et al.  Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[18]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[19]  Christos Gkantsidis,et al.  Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[20]  Feng Zhao Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).