A novel evidential evaluation for internal attacks with Dempster-Shafer theory in WSN

Muhammad Ahmed, Xu HUANG, Hongyan Cui

Research output: A Conference proceeding or a Chapter in BookConference contribution

2 Citations (Scopus)

Abstract

Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack's node behavioral pattern is different from the other neighbors, called "good nodes," in a system even neighbor nodes can be attacked. In this paper, we use Dempster-Shafer theory (DST) of combined multiple evidences to identify the malicious or internal attacks in a WSN. Moreover, it gives a numerical procedure for fusing together multiple pieces of evidences from unreliable neighbor with higher degree of conflict reliability
Original languageEnglish
Title of host publication12th IEEE International Conference on Trust Security and Privacy in Computing Communication
EditorsKejie Lu, Roberto Di Pietro, Xiaofei Liao
Place of PublicationU.S.
PublisherTrustCom Publisher
Pages688-693
Number of pages6
Volume1
ISBN (Print)9780769550220
DOIs
Publication statusPublished - 2013
Event12th IEEE International Conference on Trust Security and Privacy in Computing & Communication - Melbourne, Melbourne, Australia
Duration: 16 Jul 201318 Jul 2013

Conference

Conference12th IEEE International Conference on Trust Security and Privacy in Computing & Communication
Abbreviated titleTrustCom
CountryAustralia
CityMelbourne
Period16/07/1318/07/13

Fingerprint

Wireless sensor networks
Telecommunication links
Health
Monitoring
Processing
Costs

Cite this

Ahmed, M., HUANG, X., & Cui, H. (2013). A novel evidential evaluation for internal attacks with Dempster-Shafer theory in WSN. In K. Lu, R. D. Pietro, & X. Liao (Eds.), 12th IEEE International Conference on Trust Security and Privacy in Computing Communication (Vol. 1, pp. 688-693). U.S.: TrustCom Publisher. https://doi.org/10.1109/TrustCom.2013.276
Ahmed, Muhammad ; HUANG, Xu ; Cui, Hongyan. / A novel evidential evaluation for internal attacks with Dempster-Shafer theory in WSN. 12th IEEE International Conference on Trust Security and Privacy in Computing Communication. editor / Kejie Lu ; Roberto Di Pietro ; Xiaofei Liao. Vol. 1 U.S. : TrustCom Publisher, 2013. pp. 688-693
@inproceedings{b25f7c2ccced43a09273af78be83f5d4,
title = "A novel evidential evaluation for internal attacks with Dempster-Shafer theory in WSN",
abstract = "Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack's node behavioral pattern is different from the other neighbors, called {"}good nodes,{"} in a system even neighbor nodes can be attacked. In this paper, we use Dempster-Shafer theory (DST) of combined multiple evidences to identify the malicious or internal attacks in a WSN. Moreover, it gives a numerical procedure for fusing together multiple pieces of evidences from unreliable neighbor with higher degree of conflict reliability",
keywords = "evidential evaluation, internal attack, DST",
author = "Muhammad Ahmed and Xu HUANG and Hongyan Cui",
year = "2013",
doi = "10.1109/TrustCom.2013.276",
language = "English",
isbn = "9780769550220",
volume = "1",
pages = "688--693",
editor = "Kejie Lu and Pietro, {Roberto Di} and Xiaofei Liao",
booktitle = "12th IEEE International Conference on Trust Security and Privacy in Computing Communication",
publisher = "TrustCom Publisher",

}

Ahmed, M, HUANG, X & Cui, H 2013, A novel evidential evaluation for internal attacks with Dempster-Shafer theory in WSN. in K Lu, RD Pietro & X Liao (eds), 12th IEEE International Conference on Trust Security and Privacy in Computing Communication. vol. 1, TrustCom Publisher, U.S., pp. 688-693, 12th IEEE International Conference on Trust Security and Privacy in Computing & Communication, Melbourne, Australia, 16/07/13. https://doi.org/10.1109/TrustCom.2013.276

A novel evidential evaluation for internal attacks with Dempster-Shafer theory in WSN. / Ahmed, Muhammad; HUANG, Xu; Cui, Hongyan.

12th IEEE International Conference on Trust Security and Privacy in Computing Communication. ed. / Kejie Lu; Roberto Di Pietro; Xiaofei Liao. Vol. 1 U.S. : TrustCom Publisher, 2013. p. 688-693.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - A novel evidential evaluation for internal attacks with Dempster-Shafer theory in WSN

AU - Ahmed, Muhammad

AU - HUANG, Xu

AU - Cui, Hongyan

PY - 2013

Y1 - 2013

N2 - Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack's node behavioral pattern is different from the other neighbors, called "good nodes," in a system even neighbor nodes can be attacked. In this paper, we use Dempster-Shafer theory (DST) of combined multiple evidences to identify the malicious or internal attacks in a WSN. Moreover, it gives a numerical procedure for fusing together multiple pieces of evidences from unreliable neighbor with higher degree of conflict reliability

AB - Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack's node behavioral pattern is different from the other neighbors, called "good nodes," in a system even neighbor nodes can be attacked. In this paper, we use Dempster-Shafer theory (DST) of combined multiple evidences to identify the malicious or internal attacks in a WSN. Moreover, it gives a numerical procedure for fusing together multiple pieces of evidences from unreliable neighbor with higher degree of conflict reliability

KW - evidential evaluation

KW - internal attack

KW - DST

U2 - 10.1109/TrustCom.2013.276

DO - 10.1109/TrustCom.2013.276

M3 - Conference contribution

SN - 9780769550220

VL - 1

SP - 688

EP - 693

BT - 12th IEEE International Conference on Trust Security and Privacy in Computing Communication

A2 - Lu, Kejie

A2 - Pietro, Roberto Di

A2 - Liao, Xiaofei

PB - TrustCom Publisher

CY - U.S.

ER -

Ahmed M, HUANG X, Cui H. A novel evidential evaluation for internal attacks with Dempster-Shafer theory in WSN. In Lu K, Pietro RD, Liao X, editors, 12th IEEE International Conference on Trust Security and Privacy in Computing Communication. Vol. 1. U.S.: TrustCom Publisher. 2013. p. 688-693 https://doi.org/10.1109/TrustCom.2013.276