Effective Algorithm for protecting WSN's from internal attacks in real-time

Xu HUANG, Muhammad Ahmed, Raul Fernandez Rojas, Hongyan Cui, Mohammed Aseeri

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

1 Citation (Scopus)


Wireless sensor networks (WSNs) are playing a vital role in collecting data about a natural or built environment. WSNs have attractive advantages such as low-cost, low maintains and flexible arrangements for applications. Wireless sensor network has been used for many different applications such as military implementations in a battlefield, an environmental monitoring, and multifunction in health sector. In order to ensure its functionality, especially in
malicious environments, security mechanisms become essential. Especially internal attacks have gained prominence and pose most challenging threats to all WSNs. Although ̧ a number of works have been done to discuss a WSN under the internal attacks it has gained little attention. For example, the conventional cryptographic technique does not give the appropriated security to save the network from internal attack that causes by abnormally behaviour at the legitimate nodes in a network. In this paper, we propose an effective algorithm to make an evaluation for detecting internal attack by multi-criteria in real time. This protecting is based on the combination of the multiple pieces of evidences collected from the nodes under an internal attacker in a network. A theory of the decision is carefully discussed based on the Dempster-Shafer Theory (DST). If you really wanted to make sure the designed network works exactly works as you expected, you will be benefited from this algorithm. The advantage of this proposed method is not just its performance in real-time but also it is effective as it does not need the knowledge about the normal or malicious node in advance with very high average accuracy that is close to 100%. It also can be used as one of maintaining tools for the regulations of the deployed WSNs.
Original languageEnglish
Title of host publicationProceedings of the Australasian Computer Science Week Multiconference, ACSW 2016
EditorsXun Yi
Place of PublicationCanberra
PublisherAssociation for Computing Machinery (ACM)
Number of pages7
ISBN (Electronic)9781450340427
ISBN (Print)9781450340427
Publication statusPublished - 2016
EventAustralian Information Security Conference 2016 - Canberra, Canberra, Australia
Duration: 2 Feb 20165 Feb 2016

Publication series

NameACM International Conference Proceeding Series


ConferenceAustralian Information Security Conference 2016
Abbreviated titleAISC 2016


Dive into the research topics of 'Effective Algorithm for protecting WSN's from internal attacks in real-time'. Together they form a unique fingerprint.

Cite this