Effective Algorithm for protecting WSN's from internal attacks in real-time

Xu HUANG, Muhammad Ahmed, Raul Fernandez Rojas, Hongyan Cui, Mohammed Aseeri

Research output: A Conference proceeding or a Chapter in BookConference contribution

1 Citation (Scopus)

Abstract

Wireless sensor networks (WSNs) are playing a vital role in collecting data about a natural or built environment. WSNs have attractive advantages such as low-cost, low maintains and flexible arrangements for applications. Wireless sensor network has been used for many different applications such as military implementations in a battlefield, an environmental monitoring, and multifunction in health sector. In order to ensure its functionality, especially in
malicious environments, security mechanisms become essential. Especially internal attacks have gained prominence and pose most challenging threats to all WSNs. Although ̧ a number of works have been done to discuss a WSN under the internal attacks it has gained little attention. For example, the conventional cryptographic technique does not give the appropriated security to save the network from internal attack that causes by abnormally behaviour at the legitimate nodes in a network. In this paper, we propose an effective algorithm to make an evaluation for detecting internal attack by multi-criteria in real time. This protecting is based on the combination of the multiple pieces of evidences collected from the nodes under an internal attacker in a network. A theory of the decision is carefully discussed based on the Dempster-Shafer Theory (DST). If you really wanted to make sure the designed network works exactly works as you expected, you will be benefited from this algorithm. The advantage of this proposed method is not just its performance in real-time but also it is effective as it does not need the knowledge about the normal or malicious node in advance with very high average accuracy that is close to 100%. It also can be used as one of maintaining tools for the regulations of the deployed WSNs.
Original languageEnglish
Title of host publicationProceedings of the Australasian Computer Science Week Multiconference 2016
EditorsXun Yi
Place of PublicationCanberra
PublisherACM Publishing
Pages1-7
Number of pages7
Volume1
ISBN (Print)9781450340427
Publication statusPublished - 2016
EventAustralian Information Security Conference 2016 - Canberra, Canberra, Australia
Duration: 2 Feb 20165 Feb 2016

Conference

ConferenceAustralian Information Security Conference 2016
Abbreviated titleAISC 2016
CountryAustralia
CityCanberra
Period2/02/165/02/16

Fingerprint

Wireless sensor networks
Health
Monitoring
Costs

Cite this

HUANG, X., Ahmed, M., Fernandez Rojas, R., Cui, H., & Aseeri, M. (2016). Effective Algorithm for protecting WSN's from internal attacks in real-time. In X. Yi (Ed.), Proceedings of the Australasian Computer Science Week Multiconference 2016 (Vol. 1, pp. 1-7). Canberra: ACM Publishing.
HUANG, Xu ; Ahmed, Muhammad ; Fernandez Rojas, Raul ; Cui, Hongyan ; Aseeri, Mohammed. / Effective Algorithm for protecting WSN's from internal attacks in real-time. Proceedings of the Australasian Computer Science Week Multiconference 2016. editor / Xun Yi. Vol. 1 Canberra : ACM Publishing, 2016. pp. 1-7
@inproceedings{8c06728ad64e453990ea836a1514bd6b,
title = "Effective Algorithm for protecting WSN's from internal attacks in real-time",
abstract = "Wireless sensor networks (WSNs) are playing a vital role in collecting data about a natural or built environment. WSNs have attractive advantages such as low-cost, low maintains and flexible arrangements for applications. Wireless sensor network has been used for many different applications such as military implementations in a battlefield, an environmental monitoring, and multifunction in health sector. In order to ensure its functionality, especially inmalicious environments, security mechanisms become essential. Especially internal attacks have gained prominence and pose most challenging threats to all WSNs. Although ̧ a number of works have been done to discuss a WSN under the internal attacks it has gained little attention. For example, the conventional cryptographic technique does not give the appropriated security to save the network from internal attack that causes by abnormally behaviour at the legitimate nodes in a network. In this paper, we propose an effective algorithm to make an evaluation for detecting internal attack by multi-criteria in real time. This protecting is based on the combination of the multiple pieces of evidences collected from the nodes under an internal attacker in a network. A theory of the decision is carefully discussed based on the Dempster-Shafer Theory (DST). If you really wanted to make sure the designed network works exactly works as you expected, you will be benefited from this algorithm. The advantage of this proposed method is not just its performance in real-time but also it is effective as it does not need the knowledge about the normal or malicious node in advance with very high average accuracy that is close to 100{\%}. It also can be used as one of maintaining tools for the regulations of the deployed WSNs.",
keywords = "network-security, mobile-wireless, internal-attack",
author = "Xu HUANG and Muhammad Ahmed and {Fernandez Rojas}, Raul and Hongyan Cui and Mohammed Aseeri",
year = "2016",
language = "English",
isbn = "9781450340427",
volume = "1",
pages = "1--7",
editor = "Xun Yi",
booktitle = "Proceedings of the Australasian Computer Science Week Multiconference 2016",
publisher = "ACM Publishing",

}

HUANG, X, Ahmed, M, Fernandez Rojas, R, Cui, H & Aseeri, M 2016, Effective Algorithm for protecting WSN's from internal attacks in real-time. in X Yi (ed.), Proceedings of the Australasian Computer Science Week Multiconference 2016. vol. 1, ACM Publishing, Canberra, pp. 1-7, Australian Information Security Conference 2016, Canberra, Australia, 2/02/16.

Effective Algorithm for protecting WSN's from internal attacks in real-time. / HUANG, Xu; Ahmed, Muhammad; Fernandez Rojas, Raul; Cui, Hongyan; Aseeri, Mohammed.

Proceedings of the Australasian Computer Science Week Multiconference 2016. ed. / Xun Yi. Vol. 1 Canberra : ACM Publishing, 2016. p. 1-7.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - Effective Algorithm for protecting WSN's from internal attacks in real-time

AU - HUANG, Xu

AU - Ahmed, Muhammad

AU - Fernandez Rojas, Raul

AU - Cui, Hongyan

AU - Aseeri, Mohammed

PY - 2016

Y1 - 2016

N2 - Wireless sensor networks (WSNs) are playing a vital role in collecting data about a natural or built environment. WSNs have attractive advantages such as low-cost, low maintains and flexible arrangements for applications. Wireless sensor network has been used for many different applications such as military implementations in a battlefield, an environmental monitoring, and multifunction in health sector. In order to ensure its functionality, especially inmalicious environments, security mechanisms become essential. Especially internal attacks have gained prominence and pose most challenging threats to all WSNs. Although ̧ a number of works have been done to discuss a WSN under the internal attacks it has gained little attention. For example, the conventional cryptographic technique does not give the appropriated security to save the network from internal attack that causes by abnormally behaviour at the legitimate nodes in a network. In this paper, we propose an effective algorithm to make an evaluation for detecting internal attack by multi-criteria in real time. This protecting is based on the combination of the multiple pieces of evidences collected from the nodes under an internal attacker in a network. A theory of the decision is carefully discussed based on the Dempster-Shafer Theory (DST). If you really wanted to make sure the designed network works exactly works as you expected, you will be benefited from this algorithm. The advantage of this proposed method is not just its performance in real-time but also it is effective as it does not need the knowledge about the normal or malicious node in advance with very high average accuracy that is close to 100%. It also can be used as one of maintaining tools for the regulations of the deployed WSNs.

AB - Wireless sensor networks (WSNs) are playing a vital role in collecting data about a natural or built environment. WSNs have attractive advantages such as low-cost, low maintains and flexible arrangements for applications. Wireless sensor network has been used for many different applications such as military implementations in a battlefield, an environmental monitoring, and multifunction in health sector. In order to ensure its functionality, especially inmalicious environments, security mechanisms become essential. Especially internal attacks have gained prominence and pose most challenging threats to all WSNs. Although ̧ a number of works have been done to discuss a WSN under the internal attacks it has gained little attention. For example, the conventional cryptographic technique does not give the appropriated security to save the network from internal attack that causes by abnormally behaviour at the legitimate nodes in a network. In this paper, we propose an effective algorithm to make an evaluation for detecting internal attack by multi-criteria in real time. This protecting is based on the combination of the multiple pieces of evidences collected from the nodes under an internal attacker in a network. A theory of the decision is carefully discussed based on the Dempster-Shafer Theory (DST). If you really wanted to make sure the designed network works exactly works as you expected, you will be benefited from this algorithm. The advantage of this proposed method is not just its performance in real-time but also it is effective as it does not need the knowledge about the normal or malicious node in advance with very high average accuracy that is close to 100%. It also can be used as one of maintaining tools for the regulations of the deployed WSNs.

KW - network-security

KW - mobile-wireless

KW - internal-attack

M3 - Conference contribution

SN - 9781450340427

VL - 1

SP - 1

EP - 7

BT - Proceedings of the Australasian Computer Science Week Multiconference 2016

A2 - Yi, Xun

PB - ACM Publishing

CY - Canberra

ER -

HUANG X, Ahmed M, Fernandez Rojas R, Cui H, Aseeri M. Effective Algorithm for protecting WSN's from internal attacks in real-time. In Yi X, editor, Proceedings of the Australasian Computer Science Week Multiconference 2016. Vol. 1. Canberra: ACM Publishing. 2016. p. 1-7