A Novel Protection for Wireless Sensor Networks from Internal Attacks

Xu Huang, Muhammed Ahmed, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

4 Citations (Scopus)


Abstract—Wireless sensor networks (WSNs) are becoming part of our daily life as they are widely used due to they are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. However, due to their open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks. But for node compromised those methods can do little, which is another major problem of WSN security as it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks with multi-hop and single sinker. Our novel algorithm, called 2 by 2 (2x2) method, enable to effectively protect WSN from internal attacks such as blackhole, Sybil attacks, node replication, etc
Original languageEnglish
Title of host publicationProceedings of the International MultiConference of Engineers and Computer Scientists IMECS 2012
EditorsS.I Ao, Oscar Castillo, Craig Douglas, David Dagan Feng, Jeong A Lee
Place of PublicationHong Kong
PublisherInternational Association of Engineers (IAENG)
Number of pages6
ISBN (Print)9789881925114
Publication statusPublished - 2012
EventInternational Multiconference of Engineers and Computer Sciences 2012 - Hong Kong, Hong Kong, China
Duration: 14 Mar 201216 Mar 2012


ConferenceInternational Multiconference of Engineers and Computer Sciences 2012
Abbreviated titleIMECS 2012
CityHong Kong
Internet address


Dive into the research topics of 'A Novel Protection for Wireless Sensor Networks from Internal Attacks'. Together they form a unique fingerprint.

Cite this