Evidentiary assessment for protecting WSNs from internal attacks in real-time

Xu Huang, Raul Fernandez Rojas, Allan C. Madoc, Dua’A Ahmad

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Wireless sensor networks (WSNs) are becoming a vital role in our current modern life for detecting and collecting data about a natural or built environment, including human body. One of the reasons is due to WSNs have very attractive advantages. But one of the problems is internal attacks that have gained prominence and posed most challenging threats to all WSNs. In this paper, we extend our discussion at the conference of the AISC 2016 to an effective algorithm to make an evaluation for detecting internal attack by evidentiary assessment for protecting a WSN from the internal attacks with multi-criteria in real-time. This protecting is based on the combination of the multiple pieces of evidences collected from the nodes suffering from an internal attacker in a network. A decision made is carefully discussed based on the Dempster–Shafer Theory (DST). One of the advantages of this proposed method is that it is not just making a performance in real-time but also it is effective due to it does not need the knowledge about the normal or malicious node in advance with very high average accuracy that is close to 100%.

Original languageEnglish
Pages (from-to)1-8
Number of pages8
JournalInternational Journal of Computers and Applications
Volume39
Issue number1
Early online date8 Nov 2016
DOIs
Publication statusPublished - 1 Jan 2017

Fingerprint

Wireless sensor networks

Cite this

Huang, Xu ; Rojas, Raul Fernandez ; Madoc, Allan C. ; Ahmad, Dua’A. / Evidentiary assessment for protecting WSNs from internal attacks in real-time. In: International Journal of Computers and Applications. 2017 ; Vol. 39, No. 1. pp. 1-8.
@article{e6ef6a8f9b014a1b8b4e47d78f24c332,
title = "Evidentiary assessment for protecting WSNs from internal attacks in real-time",
abstract = "Wireless sensor networks (WSNs) are becoming a vital role in our current modern life for detecting and collecting data about a natural or built environment, including human body. One of the reasons is due to WSNs have very attractive advantages. But one of the problems is internal attacks that have gained prominence and posed most challenging threats to all WSNs. In this paper, we extend our discussion at the conference of the AISC 2016 to an effective algorithm to make an evaluation for detecting internal attack by evidentiary assessment for protecting a WSN from the internal attacks with multi-criteria in real-time. This protecting is based on the combination of the multiple pieces of evidences collected from the nodes suffering from an internal attacker in a network. A decision made is carefully discussed based on the Dempster–Shafer Theory (DST). One of the advantages of this proposed method is that it is not just making a performance in real-time but also it is effective due to it does not need the knowledge about the normal or malicious node in advance with very high average accuracy that is close to 100{\%}.",
keywords = "Dempster, Internal attacker, Net work security, Shafer theory, Wireless Sensor Network (WSN)",
author = "Xu Huang and Rojas, {Raul Fernandez} and Madoc, {Allan C.} and Dua’A Ahmad",
year = "2017",
month = "1",
day = "1",
doi = "10.1080/1206212X.2016.1249718",
language = "English",
volume = "39",
pages = "1--8",
journal = "International journal of mini & microcomputers",
issn = "0702-0481",
publisher = "Taylor and Francis Ltd.",
number = "1",

}

Evidentiary assessment for protecting WSNs from internal attacks in real-time. / Huang, Xu; Rojas, Raul Fernandez; Madoc, Allan C.; Ahmad, Dua’A.

In: International Journal of Computers and Applications, Vol. 39, No. 1, 01.01.2017, p. 1-8.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Evidentiary assessment for protecting WSNs from internal attacks in real-time

AU - Huang, Xu

AU - Rojas, Raul Fernandez

AU - Madoc, Allan C.

AU - Ahmad, Dua’A

PY - 2017/1/1

Y1 - 2017/1/1

N2 - Wireless sensor networks (WSNs) are becoming a vital role in our current modern life for detecting and collecting data about a natural or built environment, including human body. One of the reasons is due to WSNs have very attractive advantages. But one of the problems is internal attacks that have gained prominence and posed most challenging threats to all WSNs. In this paper, we extend our discussion at the conference of the AISC 2016 to an effective algorithm to make an evaluation for detecting internal attack by evidentiary assessment for protecting a WSN from the internal attacks with multi-criteria in real-time. This protecting is based on the combination of the multiple pieces of evidences collected from the nodes suffering from an internal attacker in a network. A decision made is carefully discussed based on the Dempster–Shafer Theory (DST). One of the advantages of this proposed method is that it is not just making a performance in real-time but also it is effective due to it does not need the knowledge about the normal or malicious node in advance with very high average accuracy that is close to 100%.

AB - Wireless sensor networks (WSNs) are becoming a vital role in our current modern life for detecting and collecting data about a natural or built environment, including human body. One of the reasons is due to WSNs have very attractive advantages. But one of the problems is internal attacks that have gained prominence and posed most challenging threats to all WSNs. In this paper, we extend our discussion at the conference of the AISC 2016 to an effective algorithm to make an evaluation for detecting internal attack by evidentiary assessment for protecting a WSN from the internal attacks with multi-criteria in real-time. This protecting is based on the combination of the multiple pieces of evidences collected from the nodes suffering from an internal attacker in a network. A decision made is carefully discussed based on the Dempster–Shafer Theory (DST). One of the advantages of this proposed method is that it is not just making a performance in real-time but also it is effective due to it does not need the knowledge about the normal or malicious node in advance with very high average accuracy that is close to 100%.

KW - Dempster

KW - Internal attacker

KW - Net work security

KW - Shafer theory

KW - Wireless Sensor Network (WSN)

UR - http://www.scopus.com/inward/record.url?scp=85027253384&partnerID=8YFLogxK

U2 - 10.1080/1206212X.2016.1249718

DO - 10.1080/1206212X.2016.1249718

M3 - Article

VL - 39

SP - 1

EP - 8

JO - International journal of mini & microcomputers

JF - International journal of mini & microcomputers

SN - 0702-0481

IS - 1

ER -