A Novel Algorithm for protecting from Internal Attacks of Wireless Sensor Networks

Xu Huang, Muhammad Ahmed, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

7 Citations (Scopus)

Abstract

Wireless sensor networks (WSNs) are composed of large number of low cost, low power and cooperatively collect the environmental information and realize the integration of the physical world and communication network. Due to open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks. However, node compromise is another major problem of WSN security due to it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks, by which we show our novel algorithm that under some fixed parameters designed by the network designer, we can have reasonable model for predicting the highest signal noise ratio (S/N). Therefore we may allow the sinker to be open only around that particular time period to receive the signals from the sources while the other time slots are in ⿿sleeping state� to ignore any signals, including the internal attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for the fixed network. We can easily manipulate the sending rate to control the time of the highest S/N to protect ⿿internal attacks.� The simulations results have been shown to underpin our novel algorithm.
Original languageEnglish
Title of host publication9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Place of PublicationMelbourne Australia
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages344-349
Number of pages6
Volume1
ISBN (Electronic)9780769545523
ISBN (Print)9781457718229
DOIs
Publication statusPublished - 2012
Event9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Melbourne, Melbourne, Australia
Duration: 24 Oct 201126 Oct 2011

Conference

Conference9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Abbreviated titleIFIP 2011
Country/TerritoryAustralia
CityMelbourne
Period24/10/1126/10/11

Fingerprint

Dive into the research topics of 'A Novel Algorithm for protecting from Internal Attacks of Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this