A novel two-stage Multi-crieteria evaluation for internal attack in WSN

Wireless sensor networks (WSNs) are an emerging technology for collecting data about the natural or built environment. They consist of low-cost and multifunctional resources and autonomous nodes comprising the appropriate sensors along with computational devices that transmit and receive data wirelessly. The nodes work independently to function on environmental conditions. Normally each node cooperates with its neighbours to wirelessly transmit their readings via a deployed network. A wireless sensor network can be used for many different applications range from a military implementation in the battlefield, an environmental monitoring, playing an function in health sector as well as emergency response of surveillance. With its nature and application scenario WSN had drawn a great attention to the increasing applications. In order to ensure its functionality especially in malicious environments, security mechanisms become essential. Internal attacks have gained prominence and pose most challenging threats to all WSNs. Althougḩ a number of works has been done to secure a WSN but internal attacks have gained little attention. The conventional cryptographic technique does not give the appropriate security to save the network from internal attack that cause by abnormally behaved legitimate nodes. In this paper, we have proposed a new approach for detecting internal attack in two stages with multi-criteria evaluation. A prior to the stage of implementation we have checked whether the targeted node is in transmission range or not then in the current stage, we will make a misbehavior judgment with Abnormal Behavior Identification Mechanism (ABIM) by using cosine similarity for abnormality. Secondly, we combined the multiple pieces of evidences made by the internal attacker or the abnormally behaved nodes evidenced by information sources and then using the Dempester-Shafer Theory (DST) to make final decision. The advantage of this method is that it does not need the knowledge about the normal or malicious node in advance.

[1]  Myong-Soon Park,et al.  Inside Attacker Detection in Hierarchical Wireless Sensor Network , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[2]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[3]  Luis Freire,et al.  An Extended Approach for Dempster-Shafer Theory , 2009 .

[4]  Dharmendra Sharma,et al.  A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks , 2012 .

[5]  Kari Sentz,et al.  Combination of Evidence in Dempster-Shafer Theory , 2002 .

[6]  Fabrice Valois,et al.  Resiliency of wireless sensor networks: Definitions and analyses , 2010, 2010 17th International Conference on Telecommunications.

[7]  Reza Ebrahimpour,et al.  Combination of multiple diverse classifiers using belief functions for handling data with imperfect labels , 2012, Expert Syst. Appl..

[8]  Greg Fishel,et al.  CALCULATING A DAILY NORMAL TEMPERATURE RANGE THAT REFLECTS DAILY TEMPERATURE VARIABILITY , 2005 .

[9]  Dirk Westhoff,et al.  Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[10]  Xu Huang,et al.  Timing control for protecting from internal attacks in wireless sensor networks , 2012, The International Conference on Information Network 2012.

[11]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[12]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[13]  Subhash Challa,et al.  An Introduction to Bayesian and Dempster-Shafer Data Fusion , 2003 .

[14]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[15]  Dharmendra Sharma,et al.  A Taxonomy of Internal Attacks in Wireless Sensor Network , 2012 .

[16]  Jessica Staddon,et al.  Efficient tracing of failed nodes in sensor networks , 2002, WSNA '02.