A novel two-stage Multi-crieteria evaluation for internal attack in WSN

Muhammed Ahmed, Xu Huang, Hongyan Cui, N. K. Srinath

Research output: A Conference proceeding or a Chapter in BookConference contribution

Abstract

Wireless sensor networks (WSNs) are an emerging technology for collecting data about the natural or built environment. They consist of low-cost and multifunctional resources and autonomous nodes comprising the appropriate sensors along with computational devices that transmit and receive data wirelessly. The nodes work independently to function on environmental conditions. Normally each node cooperates with its neighbours to wirelessly transmit their readings via a deployed network. A wireless sensor network can be used for many different applications range from a military implementation in the battlefield, an environmental monitoring, playing an function in health sector as well as emergency response of surveillance. With its nature and application scenario WSN had drawn a great attention to the increasing applications. In order to ensure its functionality especially in malicious environments, security mechanisms become essential. Internal attacks have gained prominence and pose most challenging threats to all WSNs. Althougḩ a number of works has been done to secure a WSN but internal attacks have gained little attention. The conventional cryptographic technique does not give the appropriate security to save the network from internal attack that cause by abnormally behaved legitimate nodes. In this paper, we have proposed a new approach for detecting internal attack in two stages with multi-criteria evaluation. A prior to the stage of implementation we have checked whether the targeted node is in transmission range or not then in the current stage, we will make a misbehavior judgment with Abnormal Behavior Identification Mechanism (ABIM) by using cosine similarity for abnormality. Secondly, we combined the multiple pieces of evidences made by the internal attacker or the abnormally behaved nodes evidenced by information sources and then using the Dempester-Shafer Theory (DST) to make final decision. The advantage of this method is that it does not need the knowledge about the normal or malicious node in advance
Original languageEnglish
Title of host publication13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013
EditorsAuapong Yaicharoen, Suparerk Manitpornut
Place of PublicationUnited States of America
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages198-203
Number of pages6
Volume1
ISBN (Print)9781467355803
DOIs
Publication statusPublished - 2013
Event13th International Symposium on Communications and Information Technologies - Samui Island, Samui Island, Thailand
Duration: 4 Sep 20136 Sep 2013

Conference

Conference13th International Symposium on Communications and Information Technologies
CountryThailand
CitySamui Island
Period4/09/136/09/13

Fingerprint

Wireless sensor networks
Health
Monitoring
Sensors
Costs

Cite this

Ahmed, M., Huang, X., Cui, H., & Srinath, N. K. (2013). A novel two-stage Multi-crieteria evaluation for internal attack in WSN. In A. Yaicharoen, & S. Manitpornut (Eds.), 13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013 (Vol. 1, pp. 198-203). United States of America: IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ISCIT.2013.6645849
Ahmed, Muhammed ; Huang, Xu ; Cui, Hongyan ; Srinath, N. K. / A novel two-stage Multi-crieteria evaluation for internal attack in WSN. 13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013. editor / Auapong Yaicharoen ; Suparerk Manitpornut. Vol. 1 United States of America : IEEE, Institute of Electrical and Electronics Engineers, 2013. pp. 198-203
@inproceedings{4c5e9331f6ec4b30a8331d0ebd46db69,
title = "A novel two-stage Multi-crieteria evaluation for internal attack in WSN",
abstract = "Wireless sensor networks (WSNs) are an emerging technology for collecting data about the natural or built environment. They consist of low-cost and multifunctional resources and autonomous nodes comprising the appropriate sensors along with computational devices that transmit and receive data wirelessly. The nodes work independently to function on environmental conditions. Normally each node cooperates with its neighbours to wirelessly transmit their readings via a deployed network. A wireless sensor network can be used for many different applications range from a military implementation in the battlefield, an environmental monitoring, playing an function in health sector as well as emergency response of surveillance. With its nature and application scenario WSN had drawn a great attention to the increasing applications. In order to ensure its functionality especially in malicious environments, security mechanisms become essential. Internal attacks have gained prominence and pose most challenging threats to all WSNs. Althougḩ a number of works has been done to secure a WSN but internal attacks have gained little attention. The conventional cryptographic technique does not give the appropriate security to save the network from internal attack that cause by abnormally behaved legitimate nodes. In this paper, we have proposed a new approach for detecting internal attack in two stages with multi-criteria evaluation. A prior to the stage of implementation we have checked whether the targeted node is in transmission range or not then in the current stage, we will make a misbehavior judgment with Abnormal Behavior Identification Mechanism (ABIM) by using cosine similarity for abnormality. Secondly, we combined the multiple pieces of evidences made by the internal attacker or the abnormally behaved nodes evidenced by information sources and then using the Dempester-Shafer Theory (DST) to make final decision. The advantage of this method is that it does not need the knowledge about the normal or malicious node in advance",
keywords = "Multi-crieteria, internal attack, WSN",
author = "Muhammed Ahmed and Xu Huang and Hongyan Cui and Srinath, {N. K.}",
year = "2013",
doi = "10.1109/ISCIT.2013.6645849",
language = "English",
isbn = "9781467355803",
volume = "1",
pages = "198--203",
editor = "Auapong Yaicharoen and Suparerk Manitpornut",
booktitle = "13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
address = "United States",

}

Ahmed, M, Huang, X, Cui, H & Srinath, NK 2013, A novel two-stage Multi-crieteria evaluation for internal attack in WSN. in A Yaicharoen & S Manitpornut (eds), 13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013. vol. 1, IEEE, Institute of Electrical and Electronics Engineers, United States of America, pp. 198-203, 13th International Symposium on Communications and Information Technologies, Samui Island, Thailand, 4/09/13. https://doi.org/10.1109/ISCIT.2013.6645849

A novel two-stage Multi-crieteria evaluation for internal attack in WSN. / Ahmed, Muhammed; Huang, Xu; Cui, Hongyan; Srinath, N. K.

13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013. ed. / Auapong Yaicharoen; Suparerk Manitpornut. Vol. 1 United States of America : IEEE, Institute of Electrical and Electronics Engineers, 2013. p. 198-203.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - A novel two-stage Multi-crieteria evaluation for internal attack in WSN

AU - Ahmed, Muhammed

AU - Huang, Xu

AU - Cui, Hongyan

AU - Srinath, N. K.

PY - 2013

Y1 - 2013

N2 - Wireless sensor networks (WSNs) are an emerging technology for collecting data about the natural or built environment. They consist of low-cost and multifunctional resources and autonomous nodes comprising the appropriate sensors along with computational devices that transmit and receive data wirelessly. The nodes work independently to function on environmental conditions. Normally each node cooperates with its neighbours to wirelessly transmit their readings via a deployed network. A wireless sensor network can be used for many different applications range from a military implementation in the battlefield, an environmental monitoring, playing an function in health sector as well as emergency response of surveillance. With its nature and application scenario WSN had drawn a great attention to the increasing applications. In order to ensure its functionality especially in malicious environments, security mechanisms become essential. Internal attacks have gained prominence and pose most challenging threats to all WSNs. Althougḩ a number of works has been done to secure a WSN but internal attacks have gained little attention. The conventional cryptographic technique does not give the appropriate security to save the network from internal attack that cause by abnormally behaved legitimate nodes. In this paper, we have proposed a new approach for detecting internal attack in two stages with multi-criteria evaluation. A prior to the stage of implementation we have checked whether the targeted node is in transmission range or not then in the current stage, we will make a misbehavior judgment with Abnormal Behavior Identification Mechanism (ABIM) by using cosine similarity for abnormality. Secondly, we combined the multiple pieces of evidences made by the internal attacker or the abnormally behaved nodes evidenced by information sources and then using the Dempester-Shafer Theory (DST) to make final decision. The advantage of this method is that it does not need the knowledge about the normal or malicious node in advance

AB - Wireless sensor networks (WSNs) are an emerging technology for collecting data about the natural or built environment. They consist of low-cost and multifunctional resources and autonomous nodes comprising the appropriate sensors along with computational devices that transmit and receive data wirelessly. The nodes work independently to function on environmental conditions. Normally each node cooperates with its neighbours to wirelessly transmit their readings via a deployed network. A wireless sensor network can be used for many different applications range from a military implementation in the battlefield, an environmental monitoring, playing an function in health sector as well as emergency response of surveillance. With its nature and application scenario WSN had drawn a great attention to the increasing applications. In order to ensure its functionality especially in malicious environments, security mechanisms become essential. Internal attacks have gained prominence and pose most challenging threats to all WSNs. Althougḩ a number of works has been done to secure a WSN but internal attacks have gained little attention. The conventional cryptographic technique does not give the appropriate security to save the network from internal attack that cause by abnormally behaved legitimate nodes. In this paper, we have proposed a new approach for detecting internal attack in two stages with multi-criteria evaluation. A prior to the stage of implementation we have checked whether the targeted node is in transmission range or not then in the current stage, we will make a misbehavior judgment with Abnormal Behavior Identification Mechanism (ABIM) by using cosine similarity for abnormality. Secondly, we combined the multiple pieces of evidences made by the internal attacker or the abnormally behaved nodes evidenced by information sources and then using the Dempester-Shafer Theory (DST) to make final decision. The advantage of this method is that it does not need the knowledge about the normal or malicious node in advance

KW - Multi-crieteria

KW - internal attack

KW - WSN

U2 - 10.1109/ISCIT.2013.6645849

DO - 10.1109/ISCIT.2013.6645849

M3 - Conference contribution

SN - 9781467355803

VL - 1

SP - 198

EP - 203

BT - 13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013

A2 - Yaicharoen, Auapong

A2 - Manitpornut, Suparerk

PB - IEEE, Institute of Electrical and Electronics Engineers

CY - United States of America

ER -

Ahmed M, Huang X, Cui H, Srinath NK. A novel two-stage Multi-crieteria evaluation for internal attack in WSN. In Yaicharoen A, Manitpornut S, editors, 13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013. Vol. 1. United States of America: IEEE, Institute of Electrical and Electronics Engineers. 2013. p. 198-203 https://doi.org/10.1109/ISCIT.2013.6645849