Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network

Muhammed Ahmed, Xu Huang, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

5 Citations (Scopus)

Abstract

Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker
Original languageEnglish
Title of host publicationIFIP International Conference on Network and Parallel Computing
Subtitle of host publicationNPC 2012: Network and Parallel Computing
EditorsJames J Park
Place of PublicationKorea
PublisherSpringer
Pages94-100
Number of pages7
Volume1
ISBN (Electronic)9783642356063
ISBN (Print)9783642356056
DOIs
Publication statusPublished - 2012
EventNPC 2012-9th IFIP International Conference on Network and Parallel Computing - Gwangju, Gwangju, Korea, Republic of
Duration: 6 Sept 20128 Sept 2012

Publication series

NameLecture Notes in Computer Science: Theoretical Computer Science and General Issues
PublisherSpringer
Volume11783
ISSN (Electronic)1611-3349

Conference

ConferenceNPC 2012-9th IFIP International Conference on Network and Parallel Computing
Country/TerritoryKorea, Republic of
CityGwangju
Period6/09/128/09/12

Fingerprint

Dive into the research topics of 'Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network'. Together they form a unique fingerprint.

Cite this