A novel algorithm for malicious attack detection in UWSN

Information transmission in the marine scenario utilizing wireless communications is unique method that empowering the technology for the evolution of imminent marine-surveillance systems and sensory networks. Under-water wireless sensor network (UWSN) in one of the auspicious technology for marine observation. The applications of underwater sensing has several domain that range from oil industry to aquaculture. Some of the UWSN applications include device checking, monitoring and control of pollution in the water, underwater ecosystems monitoring, forecasting of natural disasters and disturbances, exploration and survey missions, as well as study of oceanic life. Nodes in UWSN are normally low cost, low power. Considering the characteristics and the nature of applications, security of UWSN is one of the critical issue and had drawn significant attention to the researchers. In order to have a functional UWSN to extract the authentic data safeguarding and protection mechanisms are crucial. Malicious node attacks has accomplished as one of the most challenging attacks to UWSN. Several research has been conducted to protect UWSN from malicious attacks but majority of the works depend on either training data set or a previously defined threshold. Without an established security infrastructure a UWSN required to detect the malicious attacks is a complication and challenge. In this paper, we used evidential evaluation utilizing Dempster-Shafer theory (DST) of combined multiple evidences to identify the malicious attacks in a UWSN. Moreover, it gives a numerical procedure for fusing together multiple pieces of facts from an untrustworthy and unreliable neighbor with a higher degree of conflict reliability.

[1]  Jessica Staddon,et al.  Efficient tracing of failed nodes in sensor networks , 2002, WSNA '02.

[3]  Yizhong Ma,et al.  The intrusion detection method based on game theory in wireless sensor network , 2008, 2008 First IEEE International Conference on Ubi-Media Computing.

[4]  Mari Carmen Domingo,et al.  Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.

[5]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[6]  Kari Sentz,et al.  Combination of Evidence in Dempster-Shafer Theory , 2002 .

[7]  Reza Ebrahimpour,et al.  Combination of multiple diverse classifiers using belief functions for handling data with imperfect labels , 2012, Expert Syst. Appl..

[8]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[9]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[10]  Muhammad R. Ahmed,et al.  Markov chain Monte Carlo based internal attack evaluation for wireless sensor network , 2013 .

[11]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[12]  Jiejun Kong,et al.  The challenges of building mobile underwater wireless networks for aquatic applications , 2006, IEEE Network.

[13]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[14]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[15]  Sudip Misra,et al.  CURD: Controllable reactive jamming detection in underwater sensor networks , 2014, Pervasive Mob. Comput..

[16]  Biming Tian,et al.  Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..

[17]  Subhash Challa,et al.  An Introduction to Bayesian and Dempster-Shafer Data Fusion , 2003 .

[18]  Ítalo S. Cunha,et al.  End-to-end authentication in Under-Water Sensor Networks , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[19]  Sérgio Cavalcante,et al.  An extended approach for Dempster-Shafer theory , 2003, Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.

[20]  Ahmed Al Ghamdi,et al.  A Novel Trust and Reputation Model Based WSN Technology to Secure Border Surveillance , 2013 .

[21]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[22]  Dirk Westhoff,et al.  Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[23]  Rakowsky Uwe Kay,et al.  Fundamentals of the Dempster-Shafer theory and its applications to system safety and reliability modelling , 2007 .

[24]  Yenumula B. Reddy,et al.  A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.