A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS

Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous applications with distributed network infrastructure. With its nature and application scenario, security of WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms are essential. Malicious or internal attacker has gained attention as the most challenging attacks to WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this method we do not need any predefined threshold or tanning data set of the nodes.

[1]  Shrikanth Narayanan,et al.  Collaborative classification applications in sensor networks , 2002, Sensor Array and Multichannel Signal Processing Workshop Proceedings, 2002.

[2]  Sérgio Cavalcante,et al.  An extended approach for Dempster-Shafer theory , 2003, Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.

[3]  Christos Gkantsidis,et al.  Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[4]  Balasubramaniam Natarajan,et al.  Optimal Control-Based Strategy for Sensor Deployment , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[5]  Andrea Conti,et al.  An Overview on Wireless Sensor Networks Technology and Evolution , 2009, Sensors.

[6]  Fabrice Valois,et al.  Resiliency of wireless sensor networks: Definitions and analyses , 2010, 2010 17th International Conference on Telecommunications.

[7]  Kamal Jain,et al.  Signatures for Network Coding , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[8]  Yong Guan,et al.  An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[9]  Bruno Sinopoli,et al.  Distributed control applications within sensor networks , 2003, Proc. IEEE.

[10]  Pavan Sikka,et al.  Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[11]  Greg Fishel,et al.  CALCULATING A DAILY NORMAL TEMPERATURE RANGE THAT REFLECTS DAILY TEMPERATURE VARIABILITY , 2005 .

[12]  Rakowsky Uwe Kay,et al.  Fundamentals of the Dempster-Shafer theory and its applications to system safety and reliability modelling , 2007 .

[13]  Subhash Challa,et al.  An Introduction to Bayesian and Dempster-Shafer Data Fusion , 2003 .

[14]  Bruce H. Krogh,et al.  Energy-efficient surveillance system using wireless sensor networks , 2004, MobiSys '04.

[15]  Xu Huang,et al.  Timing control for protecting from internal attacks in wireless sensor networks , 2012, The International Conference on Information Network 2012.

[16]  Hyuk Lim,et al.  J-Sim: a simulation and emulation environment for wireless sensor networks , 2006, IEEE Wireless Communications.

[17]  Dharmendra Sharma,et al.  A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks , 2012 .

[18]  Xu Huang,et al.  A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks , 2011, 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing.

[19]  Feng Zhao Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[20]  Reza Ebrahimpour,et al.  Combination of multiple diverse classifiers using belief functions for handling data with imperfect labels , 2012, Expert Syst. Appl..

[21]  Yu Hen Hu,et al.  Detection, classification, and tracking of targets , 2002, IEEE Signal Process. Mag..

[22]  Robert H. Deng,et al.  Secure localization with attack detection in wireless sensor networks , 2011, International Journal of Information Security.

[23]  Mohsen Guizani,et al.  A framework for a distributed key management scheme in heterogeneous wireless sensor networks , 2008, IEEE Trans. Wirel. Commun..

[24]  Dharmendra Sharma,et al.  A Taxonomy of Internal Attacks in Wireless Sensor Network , 2012 .

[25]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.