A Novel Protection for Wireless Sensor Networks from Internal Attacks

Xu Huang, Muhammed Ahmed, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contribution

1 Citation (Scopus)

Abstract

Abstract—Wireless sensor networks (WSNs) are becoming part of our daily life as they are widely used due to they are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. However, due to their open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks. But for node compromised those methods can do little, which is another major problem of WSN security as it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks with multi-hop and single sinker. Our novel algorithm, called 2 by 2 (2x2) method, enable to effectively protect WSN from internal attacks such as blackhole, Sybil attacks, node replication, etc
Original languageEnglish
Title of host publicationProceedings of the International MultiConference of Engineers and Computer Scientists IMECS 2012
EditorsS.I Ao, Oscar Castillo, Craig Douglas, David Dagan Feng, Jeong A Lee
Place of PublicationHong Kong
PublisherInternational Association of Engineers (IAENG)
Pages374-379
Number of pages6
Volume1
ISBN (Print)9789881925114
Publication statusPublished - 2012
EventInternational Multiconference of Engineers and Computer Sciences 2012 - Hong Kong, Hong Kong, China
Duration: 14 Mar 201216 Mar 2012
http://www.iaeng.org/IMECS2012/index.html

Conference

ConferenceInternational Multiconference of Engineers and Computer Sciences 2012
Abbreviated titleIMECS 2012
CountryChina
CityHong Kong
Period14/03/1216/03/12
Internet address

Fingerprint

Sensor networks
Telecommunication networks
Wireless sensor networks
Costs

Cite this

Huang, X., Ahmed, M., & Sharma, D. (2012). A Novel Protection for Wireless Sensor Networks from Internal Attacks. In S. I. Ao, O. Castillo, C. Douglas, D. D. Feng, & J. A. Lee (Eds.), Proceedings of the International MultiConference of Engineers and Computer Scientists IMECS 2012 (Vol. 1, pp. 374-379). Hong Kong: International Association of Engineers (IAENG).
Huang, Xu ; Ahmed, Muhammed ; Sharma, Dharmendra. / A Novel Protection for Wireless Sensor Networks from Internal Attacks. Proceedings of the International MultiConference of Engineers and Computer Scientists IMECS 2012. editor / S.I Ao ; Oscar Castillo ; Craig Douglas ; David Dagan Feng ; Jeong A Lee. Vol. 1 Hong Kong : International Association of Engineers (IAENG), 2012. pp. 374-379
@inproceedings{1df61962ddb047049788a0dea971115c,
title = "A Novel Protection for Wireless Sensor Networks from Internal Attacks",
abstract = "Abstract—Wireless sensor networks (WSNs) are becoming part of our daily life as they are widely used due to they are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. However, due to their open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks. But for node compromised those methods can do little, which is another major problem of WSN security as it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks with multi-hop and single sinker. Our novel algorithm, called 2 by 2 (2x2) method, enable to effectively protect WSN from internal attacks such as blackhole, Sybil attacks, node replication, etc",
author = "Xu Huang and Muhammed Ahmed and Dharmendra Sharma",
year = "2012",
language = "English",
isbn = "9789881925114",
volume = "1",
pages = "374--379",
editor = "S.I Ao and Oscar Castillo and Craig Douglas and Feng, {David Dagan} and Lee, {Jeong A}",
booktitle = "Proceedings of the International MultiConference of Engineers and Computer Scientists IMECS 2012",
publisher = "International Association of Engineers (IAENG)",

}

Huang, X, Ahmed, M & Sharma, D 2012, A Novel Protection for Wireless Sensor Networks from Internal Attacks. in SI Ao, O Castillo, C Douglas, DD Feng & JA Lee (eds), Proceedings of the International MultiConference of Engineers and Computer Scientists IMECS 2012. vol. 1, International Association of Engineers (IAENG), Hong Kong, pp. 374-379, International Multiconference of Engineers and Computer Sciences 2012, Hong Kong, China, 14/03/12.

A Novel Protection for Wireless Sensor Networks from Internal Attacks. / Huang, Xu; Ahmed, Muhammed; Sharma, Dharmendra.

Proceedings of the International MultiConference of Engineers and Computer Scientists IMECS 2012. ed. / S.I Ao; Oscar Castillo; Craig Douglas; David Dagan Feng; Jeong A Lee. Vol. 1 Hong Kong : International Association of Engineers (IAENG), 2012. p. 374-379.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - A Novel Protection for Wireless Sensor Networks from Internal Attacks

AU - Huang, Xu

AU - Ahmed, Muhammed

AU - Sharma, Dharmendra

PY - 2012

Y1 - 2012

N2 - Abstract—Wireless sensor networks (WSNs) are becoming part of our daily life as they are widely used due to they are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. However, due to their open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks. But for node compromised those methods can do little, which is another major problem of WSN security as it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks with multi-hop and single sinker. Our novel algorithm, called 2 by 2 (2x2) method, enable to effectively protect WSN from internal attacks such as blackhole, Sybil attacks, node replication, etc

AB - Abstract—Wireless sensor networks (WSNs) are becoming part of our daily life as they are widely used due to they are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. However, due to their open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks. But for node compromised those methods can do little, which is another major problem of WSN security as it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks with multi-hop and single sinker. Our novel algorithm, called 2 by 2 (2x2) method, enable to effectively protect WSN from internal attacks such as blackhole, Sybil attacks, node replication, etc

M3 - Conference contribution

SN - 9789881925114

VL - 1

SP - 374

EP - 379

BT - Proceedings of the International MultiConference of Engineers and Computer Scientists IMECS 2012

A2 - Ao, S.I

A2 - Castillo, Oscar

A2 - Douglas, Craig

A2 - Feng, David Dagan

A2 - Lee, Jeong A

PB - International Association of Engineers (IAENG)

CY - Hong Kong

ER -

Huang X, Ahmed M, Sharma D. A Novel Protection for Wireless Sensor Networks from Internal Attacks. In Ao SI, Castillo O, Douglas C, Feng DD, Lee JA, editors, Proceedings of the International MultiConference of Engineers and Computer Scientists IMECS 2012. Vol. 1. Hong Kong: International Association of Engineers (IAENG). 2012. p. 374-379