Abstract
Wireless sensor Network (WSN) is known to be vulnerable to variety of attacks due to the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or insider attacker has gained prominence and poses the most challenging attacks to WSN. Many works has been done to secure WSN from internal attacker but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure WSN need to find the internal attacker. Normally, internal attacker node behavioral pattern is different from the other neighbor good nodes in the system, but neighbor node can be attacked as well. In this paper, we use Dempster-Shafer theory (DST) of combined multiple evidence to identify the malicious or internal attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. Moreover, it gives a numerical procedure for fusing together multiple pieces of evidence from unreliable neighbor with higher degree of conflict reliability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Huang, X., Ahmed, M., Sharma, D.: Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks. In: IEEE ICOIN 2012, Bali, Indonesia (February 2012)
Ahmed, M., Hunag, X., Sharma, D.: A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks. In: ICIS 2012, Kuala Lumpur, Malaysia (2012)
Staddon, J., Balfanz, D., Durfee, G.: Efficient tracing of failed nodes in sensor networks. In: WSNA 2002, Atlanta, USA, pp. 122–130 (2002)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: ACM MOBICOM 2000, Boston, USA, pp. 255–265 (August 2000)
Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-hoc Networks. In: ACM MOBICOM 2000, Boston, USA, pp. 275–283 (August 2000)
Sentz, K.: Combination of Evidence in Dempester-Shafer Theory. System Science and Engineering Department, Binghamton University, SAND 2002-0835 (April 2002)
Koks, D., Challa, S.: An Introduction to Bayesian and Dempster-Shafer Data Fusion. Published by DSTO Systems Sciences Laboratory, Australia (November 2005)
Tabassian, M., Ghaderi, R., Ebrahimpour, R.: Combination of multiple diverse classifiers using belief functions for handling data with imperfect labels. Expert Systems with Applications 39 (2011)
Khalaja, F., Khalajb, M., Khalaj, A.H.: Bounded Error for Robust Fault Detection under Uncertainty, Part 1: Proposed Model Using Dempster-Shafer Theory. Journal of Basic and Applied Scientific Research 2(2), 1233–1240 (2012)
Campos, F., Cavalcante, S.: An Extended Approach for Dempster-Shafer Theory. In: Information Reuse and Integration, IRI 2003. IEEE (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ahmed, M., Huang, X., Sharma, D., Shutao, L. (2012). Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory. In: Xiang, Y., Stojmenovic, I., Apduhan, B.O., Wang, G., Nakano, K., Zomaya, A. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2012. Lecture Notes in Computer Science, vol 7440. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33065-0_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-33065-0_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33064-3
Online ISBN: 978-3-642-33065-0
eBook Packages: Computer ScienceComputer Science (R0)