Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network

Muhammed Ahmed, Xu Huang, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contribution

3 Citations (Scopus)

Abstract

Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker
Original languageEnglish
Title of host publicationIFIP International Conference on Network and Parallel Computing
Subtitle of host publicationNPC 2012: Network and Parallel Computing
EditorsJames J Park
Place of PublicationKorea
PublisherSpringer
Pages94-100
Number of pages7
Volume1
ISBN (Electronic)9783642356063
ISBN (Print)9783642356056
DOIs
Publication statusPublished - 2012
EventNPC 2012-9th IFIP International Conference on Network and Parallel Computing - Gwangju, Gwangju, Korea, Republic of
Duration: 6 Sep 20128 Sep 2012

Publication series

NameLecture Notes in Computer Science: Theoretical Computer Science and General Issues
PublisherSpringer
Volume11783
ISSN (Electronic)1611-3349

Conference

ConferenceNPC 2012-9th IFIP International Conference on Network and Parallel Computing
CountryKorea, Republic of
CityGwangju
Period6/09/128/09/12

Fingerprint

Wireless sensor networks
Uncertainty

Cite this

Ahmed, M., Huang, X., & Sharma, D. (2012). Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. In J. J. Park (Ed.), IFIP International Conference on Network and Parallel Computing: NPC 2012: Network and Parallel Computing (Vol. 1, pp. 94-100). (Lecture Notes in Computer Science: Theoretical Computer Science and General Issues ; Vol. 11783). Korea: Springer. https://doi.org/10.1007/978-3-642-35606-3_11
Ahmed, Muhammed ; Huang, Xu ; Sharma, Dharmendra. / Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. IFIP International Conference on Network and Parallel Computing: NPC 2012: Network and Parallel Computing. editor / James J Park. Vol. 1 Korea : Springer, 2012. pp. 94-100 (Lecture Notes in Computer Science: Theoretical Computer Science and General Issues ).
@inproceedings{bf37f88648544e928b7d64afb06bfbdf,
title = "Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network",
abstract = "Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker",
keywords = "Wireless Sensor Network (WSN), insider attack, security",
author = "Muhammed Ahmed and Xu Huang and Dharmendra Sharma",
year = "2012",
doi = "10.1007/978-3-642-35606-3_11",
language = "English",
isbn = "9783642356056",
volume = "1",
series = "Lecture Notes in Computer Science: Theoretical Computer Science and General Issues",
publisher = "Springer",
pages = "94--100",
editor = "Park, {James J}",
booktitle = "IFIP International Conference on Network and Parallel Computing",
address = "Netherlands",

}

Ahmed, M, Huang, X & Sharma, D 2012, Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. in JJ Park (ed.), IFIP International Conference on Network and Parallel Computing: NPC 2012: Network and Parallel Computing. vol. 1, Lecture Notes in Computer Science: Theoretical Computer Science and General Issues , vol. 11783, Springer, Korea, pp. 94-100, NPC 2012-9th IFIP International Conference on Network and Parallel Computing, Gwangju, Korea, Republic of, 6/09/12. https://doi.org/10.1007/978-3-642-35606-3_11

Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. / Ahmed, Muhammed; Huang, Xu; Sharma, Dharmendra.

IFIP International Conference on Network and Parallel Computing: NPC 2012: Network and Parallel Computing. ed. / James J Park. Vol. 1 Korea : Springer, 2012. p. 94-100 (Lecture Notes in Computer Science: Theoretical Computer Science and General Issues ; Vol. 11783).

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network

AU - Ahmed, Muhammed

AU - Huang, Xu

AU - Sharma, Dharmendra

PY - 2012

Y1 - 2012

N2 - Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker

AB - Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker

KW - Wireless Sensor Network (WSN)

KW - insider attack

KW - security

U2 - 10.1007/978-3-642-35606-3_11

DO - 10.1007/978-3-642-35606-3_11

M3 - Conference contribution

SN - 9783642356056

VL - 1

T3 - Lecture Notes in Computer Science: Theoretical Computer Science and General Issues

SP - 94

EP - 100

BT - IFIP International Conference on Network and Parallel Computing

A2 - Park, James J

PB - Springer

CY - Korea

ER -

Ahmed M, Huang X, Sharma D. Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. In Park JJ, editor, IFIP International Conference on Network and Parallel Computing: NPC 2012: Network and Parallel Computing. Vol. 1. Korea: Springer. 2012. p. 94-100. (Lecture Notes in Computer Science: Theoretical Computer Science and General Issues ). https://doi.org/10.1007/978-3-642-35606-3_11