Skip to main content

Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory

  • Conference paper
Algorithms and Architectures for Parallel Processing (ICA3PP 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7440))

Abstract

Wireless sensor Network (WSN) is known to be vulnerable to variety of attacks due to the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or insider attacker has gained prominence and poses the most challenging attacks to WSN. Many works has been done to secure WSN from internal attacker but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure WSN need to find the internal attacker. Normally, internal attacker node behavioral pattern is different from the other neighbor good nodes in the system, but neighbor node can be attacked as well. In this paper, we use Dempster-Shafer theory (DST) of combined multiple evidence to identify the malicious or internal attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. Moreover, it gives a numerical procedure for fusing together multiple pieces of evidence from unreliable neighbor with higher degree of conflict reliability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Huang, X., Ahmed, M., Sharma, D.: Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks. In: IEEE ICOIN 2012, Bali, Indonesia (February 2012)

    Google Scholar 

  2. Ahmed, M., Hunag, X., Sharma, D.: A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks. In: ICIS 2012, Kuala Lumpur, Malaysia (2012)

    Google Scholar 

  3. Staddon, J., Balfanz, D., Durfee, G.: Efficient tracing of failed nodes in sensor networks. In: WSNA 2002, Atlanta, USA, pp. 122–130 (2002)

    Google Scholar 

  4. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: ACM MOBICOM 2000, Boston, USA, pp. 255–265 (August 2000)

    Google Scholar 

  5. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-hoc Networks. In: ACM MOBICOM 2000, Boston, USA, pp. 275–283 (August 2000)

    Google Scholar 

  6. Sentz, K.: Combination of Evidence in Dempester-Shafer Theory. System Science and Engineering Department, Binghamton University, SAND 2002-0835 (April 2002)

    Google Scholar 

  7. Koks, D., Challa, S.: An Introduction to Bayesian and Dempster-Shafer Data Fusion. Published by DSTO Systems Sciences Laboratory, Australia (November 2005)

    Google Scholar 

  8. Tabassian, M., Ghaderi, R., Ebrahimpour, R.: Combination of multiple diverse classifiers using belief functions for handling data with imperfect labels. Expert Systems with Applications 39 (2011)

    Google Scholar 

  9. Khalaja, F., Khalajb, M., Khalaj, A.H.: Bounded Error for Robust Fault Detection under Uncertainty, Part 1: Proposed Model Using Dempster-Shafer Theory. Journal of Basic and Applied Scientific Research 2(2), 1233–1240 (2012)

    Google Scholar 

  10. Campos, F., Cavalcante, S.: An Extended Approach for Dempster-Shafer Theory. In: Information Reuse and Integration, IRI 2003. IEEE (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahmed, M., Huang, X., Sharma, D., Shutao, L. (2012). Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory. In: Xiang, Y., Stojmenovic, I., Apduhan, B.O., Wang, G., Nakano, K., Zomaya, A. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2012. Lecture Notes in Computer Science, vol 7440. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33065-0_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33065-0_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33064-3

  • Online ISBN: 978-3-642-33065-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics