Smart integration of cloud computing and MCMC based secured WSN to monitor environment

Wireless Sensor Network (WSN) is a low cost and multifunctional emerging technology. Its application ranges from military, health sector, environmental monitoring and industrial application. The maximum benefit of recent technology development can be achieved by integration internet (Cloud Computing) and secured real time data collection platform (secured-WSNs). In order to ensure its functionality especially in malicious environments, security mechanisms are essential in WSNs. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. So, for complete security internal attacks need to be handled. In this paper we proposed content-based publish/subscribe (pub/sub) broker model on the Cloud that integrates WSNs to Cloud efficiently and effectively. To secure WSNs we have proposed a new approach for detecting internal attack by using Markov Chain Monte Carlo (MCMC). It is an efficient real time algorithm. It is good for sensor network as it operates with no or incomplete classification information. Our result shows the output of the internal attacker evaluation.

[1]  Bruno Sinopoli,et al.  Distributed control applications within sensor networks , 2003, Proc. IEEE.

[2]  R. S. Ponmagal,et al.  Integration of Wireless Sensor Network with Cloud , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[3]  Yu Hen Hu,et al.  Detection, classification, and tracking of targets , 2002, IEEE Signal Process. Mag..

[4]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[5]  Anne-Marie Kermarrec,et al.  The many faces of publish/subscribe , 2003, CSUR.

[6]  Stephen P. Brooks,et al.  Miscellanea. On quantile estimation and Markov chain Monte Carlo convergence , 1999 .

[7]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[8]  Feng Zhao Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[9]  Dharmendra Sharma,et al.  A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks , 2012 .

[10]  Yizhong Ma,et al.  The intrusion detection method based on game theory in wireless sensor network , 2008, 2008 First IEEE International Conference on Ubi-Media Computing.

[11]  Shrikanth Narayanan,et al.  Collaborative classification applications in sensor networks , 2002, Sensor Array and Multichannel Signal Processing Workshop Proceedings, 2002.

[12]  Xu Huang,et al.  Timing control for protecting from internal attacks in wireless sensor networks , 2012, The International Conference on Information Network 2012.

[13]  Pavan Sikka,et al.  Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[14]  Dedy Dwi Prastyo,et al.  Markov Chain Monte Carlo - Based Approaches for Modeling the Spatial Survival with Conditional Autoregressive (CAR) Frailty , 2010 .

[15]  Steven Myers,et al.  Secure cloud computing with brokered trusted sensor networks , 2010, 2010 International Symposium on Collaborative Technologies and Systems.

[16]  Yenumula B. Reddy,et al.  A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.

[17]  Bruce H. Krogh,et al.  Energy-efficient surveillance system using wireless sensor networks , 2004, MobiSys '04.

[18]  Dharmendra Sharma,et al.  A Taxonomy of Internal Attacks in Wireless Sensor Network , 2012 .

[19]  Jessica Staddon,et al.  Efficient tracing of failed nodes in sensor networks , 2002, WSNA '02.

[20]  S. Godsill On the Relationship Between Markov chain Monte Carlo Methods for Model Uncertainty , 2001 .

[21]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[22]  Elisa Bertino,et al.  Efficient privacy preserving content based publish subscribe systems , 2012, SACMAT '12.