Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network

Muhammed Ahmed, Xu Huang, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contribution

2 Citations (Scopus)

Abstract

Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker
Original languageEnglish
Title of host publicationIFIP International Conference on Network and Parallel Computing
Subtitle of host publicationNPC 2012: Network and Parallel Computing
EditorsJames J Park
Place of PublicationKorea
PublisherLecture Notes in Computer Sciences 7513
Pages94-100
Number of pages7
Volume1
ISBN (Electronic)9783642356063
ISBN (Print)9783642356056
DOIs
Publication statusPublished - 2012
EventNPC 2012-9th IFIP International Conference on Network and Parallel Computing - Gwangju, Gwangju, Korea, Republic of
Duration: 6 Sep 20128 Sep 2012

Conference

ConferenceNPC 2012-9th IFIP International Conference on Network and Parallel Computing
CountryKorea, Republic of
CityGwangju
Period6/09/128/09/12

Fingerprint

Wireless sensor networks
Uncertainty

Cite this

Ahmed, M., Huang, X., & Sharma, D. (2012). Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. In J. J. Park (Ed.), IFIP International Conference on Network and Parallel Computing: NPC 2012: Network and Parallel Computing (Vol. 1, pp. 94-100). Korea: Lecture Notes in Computer Sciences 7513. https://doi.org/10.1007/978-3-642-35606-3_11
Ahmed, Muhammed ; Huang, Xu ; Sharma, Dharmendra. / Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. IFIP International Conference on Network and Parallel Computing: NPC 2012: Network and Parallel Computing. editor / James J Park. Vol. 1 Korea : Lecture Notes in Computer Sciences 7513, 2012. pp. 94-100
@inproceedings{bf37f88648544e928b7d64afb06bfbdf,
title = "Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network",
abstract = "Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker",
author = "Muhammed Ahmed and Xu Huang and Dharmendra Sharma",
year = "2012",
doi = "10.1007/978-3-642-35606-3_11",
language = "English",
isbn = "9783642356056",
volume = "1",
pages = "94--100",
editor = "Park, {James J}",
booktitle = "IFIP International Conference on Network and Parallel Computing",
publisher = "Lecture Notes in Computer Sciences 7513",

}

Ahmed, M, Huang, X & Sharma, D 2012, Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. in JJ Park (ed.), IFIP International Conference on Network and Parallel Computing: NPC 2012: Network and Parallel Computing. vol. 1, Lecture Notes in Computer Sciences 7513, Korea, pp. 94-100, NPC 2012-9th IFIP International Conference on Network and Parallel Computing, Gwangju, Korea, Republic of, 6/09/12. https://doi.org/10.1007/978-3-642-35606-3_11

Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. / Ahmed, Muhammed; Huang, Xu; Sharma, Dharmendra.

IFIP International Conference on Network and Parallel Computing: NPC 2012: Network and Parallel Computing. ed. / James J Park. Vol. 1 Korea : Lecture Notes in Computer Sciences 7513, 2012. p. 94-100.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network

AU - Ahmed, Muhammed

AU - Huang, Xu

AU - Sharma, Dharmendra

PY - 2012

Y1 - 2012

N2 - Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker

AB - Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker

U2 - 10.1007/978-3-642-35606-3_11

DO - 10.1007/978-3-642-35606-3_11

M3 - Conference contribution

SN - 9783642356056

VL - 1

SP - 94

EP - 100

BT - IFIP International Conference on Network and Parallel Computing

A2 - Park, James J

PB - Lecture Notes in Computer Sciences 7513

CY - Korea

ER -

Ahmed M, Huang X, Sharma D. Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. In Park JJ, editor, IFIP International Conference on Network and Parallel Computing: NPC 2012: Network and Parallel Computing. Vol. 1. Korea: Lecture Notes in Computer Sciences 7513. 2012. p. 94-100 https://doi.org/10.1007/978-3-642-35606-3_11