Malicious node detection for the future network security from epistemic uncertainties

Xu Huang, Muhammed Ahmed, Hongyan Cui, Shutao Li

Research output: A Conference proceeding or a Chapter in BookConference contribution

Abstract

The next generation of WSN will benefit when sensor data is added to blogs, virtual communities, and social network applications. Wireless sensor networks (WSNs) are popular now as distributed networks exposed to an open environment, collecting of self-organized nodes with limited computation and communication capabilities and energy covering deployed areas that interested by the controllers. WSNs have been as aware of environmental technologies such as sound, water contamination, temperature, pressure, motion and other pollutants. However, as wireless communication becomes all sectors of daily life, the security threats to WSNs become increasingly diversified, prevention based due to the open nature of the wireless medium. The node in a WSN is called compromised becomes another major problem of WSN security because it allows an adversary to enter inside the security perimeter of the network and launch attacks, which has raised a serious challenge for WSNs. This paper is focusing on investigating integrating wireless sensor networks with cloud computing with the case that internal attacks of WSNs with multi-hop and single sinker for the future network, such as compromised nodes in a deployed WSN, where we first present our novel protecting algorithm to WSN to protect it with the evidences that our novel algorithm works efficiently and effectively. Our new algorithm takes advantages from uncertain decisions, which means there is no need to know the structure before we check the network. It is involved in the posteriori probability of binary events represented by the beta family of density functions and Dempester Shafer theory (DST). AS it has no need to have any knowledge about the structure of the network, it will be flexible to use in real life
Original languageEnglish
Title of host publicationInternational Symposium on Wireless Personal Multimedia Communications, WPMC
Place of PublicationUSA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1-6
Number of pages6
Volume1
Publication statusPublished - 2013
Event16th International Symposium on Wireless Personal Multimedia Communications, 2013 - Atlantic City, Atlantic City, United States
Duration: 24 Jun 201327 Jun 2013

Publication series

NameWPMC 2013
PublisherIEEE
Volume1
ISSN (Print)1347-6890

Conference

Conference16th International Symposium on Wireless Personal Multimedia Communications, 2013
CountryUnited States
CityAtlantic City
Period24/06/1327/06/13

Fingerprint

Network security
Wireless sensor networks
Uncertainty
Environmental technology
Blogs
Communication
Cloud computing
Probability density function
Contamination
Acoustic waves

Cite this

Huang, X., Ahmed, M., Cui, H., & Li, S. (2013). Malicious node detection for the future network security from epistemic uncertainties. In International Symposium on Wireless Personal Multimedia Communications, WPMC (Vol. 1, pp. 1-6). (WPMC 2013; Vol. 1). USA: IEEE, Institute of Electrical and Electronics Engineers.
Huang, Xu ; Ahmed, Muhammed ; Cui, Hongyan ; Li, Shutao. / Malicious node detection for the future network security from epistemic uncertainties. International Symposium on Wireless Personal Multimedia Communications, WPMC. Vol. 1 USA : IEEE, Institute of Electrical and Electronics Engineers, 2013. pp. 1-6 (WPMC 2013).
@inproceedings{e26edea7bdd740c2b00ae6ec93bf6eb0,
title = "Malicious node detection for the future network security from epistemic uncertainties",
abstract = "The next generation of WSN will benefit when sensor data is added to blogs, virtual communities, and social network applications. Wireless sensor networks (WSNs) are popular now as distributed networks exposed to an open environment, collecting of self-organized nodes with limited computation and communication capabilities and energy covering deployed areas that interested by the controllers. WSNs have been as aware of environmental technologies such as sound, water contamination, temperature, pressure, motion and other pollutants. However, as wireless communication becomes all sectors of daily life, the security threats to WSNs become increasingly diversified, prevention based due to the open nature of the wireless medium. The node in a WSN is called compromised becomes another major problem of WSN security because it allows an adversary to enter inside the security perimeter of the network and launch attacks, which has raised a serious challenge for WSNs. This paper is focusing on investigating integrating wireless sensor networks with cloud computing with the case that internal attacks of WSNs with multi-hop and single sinker for the future network, such as compromised nodes in a deployed WSN, where we first present our novel protecting algorithm to WSN to protect it with the evidences that our novel algorithm works efficiently and effectively. Our new algorithm takes advantages from uncertain decisions, which means there is no need to know the structure before we check the network. It is involved in the posteriori probability of binary events represented by the beta family of density functions and Dempester Shafer theory (DST). AS it has no need to have any knowledge about the structure of the network, it will be flexible to use in real life",
keywords = "Node detection, Future network, Epistemic",
author = "Xu Huang and Muhammed Ahmed and Hongyan Cui and Shutao Li",
year = "2013",
language = "English",
volume = "1",
series = "WPMC 2013",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
pages = "1--6",
booktitle = "International Symposium on Wireless Personal Multimedia Communications, WPMC",
address = "United States",

}

Huang, X, Ahmed, M, Cui, H & Li, S 2013, Malicious node detection for the future network security from epistemic uncertainties. in International Symposium on Wireless Personal Multimedia Communications, WPMC. vol. 1, WPMC 2013, vol. 1, IEEE, Institute of Electrical and Electronics Engineers, USA, pp. 1-6, 16th International Symposium on Wireless Personal Multimedia Communications, 2013, Atlantic City, United States, 24/06/13.

Malicious node detection for the future network security from epistemic uncertainties. / Huang, Xu; Ahmed, Muhammed; Cui, Hongyan; Li, Shutao.

International Symposium on Wireless Personal Multimedia Communications, WPMC. Vol. 1 USA : IEEE, Institute of Electrical and Electronics Engineers, 2013. p. 1-6 (WPMC 2013; Vol. 1).

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - Malicious node detection for the future network security from epistemic uncertainties

AU - Huang, Xu

AU - Ahmed, Muhammed

AU - Cui, Hongyan

AU - Li, Shutao

PY - 2013

Y1 - 2013

N2 - The next generation of WSN will benefit when sensor data is added to blogs, virtual communities, and social network applications. Wireless sensor networks (WSNs) are popular now as distributed networks exposed to an open environment, collecting of self-organized nodes with limited computation and communication capabilities and energy covering deployed areas that interested by the controllers. WSNs have been as aware of environmental technologies such as sound, water contamination, temperature, pressure, motion and other pollutants. However, as wireless communication becomes all sectors of daily life, the security threats to WSNs become increasingly diversified, prevention based due to the open nature of the wireless medium. The node in a WSN is called compromised becomes another major problem of WSN security because it allows an adversary to enter inside the security perimeter of the network and launch attacks, which has raised a serious challenge for WSNs. This paper is focusing on investigating integrating wireless sensor networks with cloud computing with the case that internal attacks of WSNs with multi-hop and single sinker for the future network, such as compromised nodes in a deployed WSN, where we first present our novel protecting algorithm to WSN to protect it with the evidences that our novel algorithm works efficiently and effectively. Our new algorithm takes advantages from uncertain decisions, which means there is no need to know the structure before we check the network. It is involved in the posteriori probability of binary events represented by the beta family of density functions and Dempester Shafer theory (DST). AS it has no need to have any knowledge about the structure of the network, it will be flexible to use in real life

AB - The next generation of WSN will benefit when sensor data is added to blogs, virtual communities, and social network applications. Wireless sensor networks (WSNs) are popular now as distributed networks exposed to an open environment, collecting of self-organized nodes with limited computation and communication capabilities and energy covering deployed areas that interested by the controllers. WSNs have been as aware of environmental technologies such as sound, water contamination, temperature, pressure, motion and other pollutants. However, as wireless communication becomes all sectors of daily life, the security threats to WSNs become increasingly diversified, prevention based due to the open nature of the wireless medium. The node in a WSN is called compromised becomes another major problem of WSN security because it allows an adversary to enter inside the security perimeter of the network and launch attacks, which has raised a serious challenge for WSNs. This paper is focusing on investigating integrating wireless sensor networks with cloud computing with the case that internal attacks of WSNs with multi-hop and single sinker for the future network, such as compromised nodes in a deployed WSN, where we first present our novel protecting algorithm to WSN to protect it with the evidences that our novel algorithm works efficiently and effectively. Our new algorithm takes advantages from uncertain decisions, which means there is no need to know the structure before we check the network. It is involved in the posteriori probability of binary events represented by the beta family of density functions and Dempester Shafer theory (DST). AS it has no need to have any knowledge about the structure of the network, it will be flexible to use in real life

KW - Node detection

KW - Future network

KW - Epistemic

M3 - Conference contribution

VL - 1

T3 - WPMC 2013

SP - 1

EP - 6

BT - International Symposium on Wireless Personal Multimedia Communications, WPMC

PB - IEEE, Institute of Electrical and Electronics Engineers

CY - USA

ER -

Huang X, Ahmed M, Cui H, Li S. Malicious node detection for the future network security from epistemic uncertainties. In International Symposium on Wireless Personal Multimedia Communications, WPMC. Vol. 1. USA: IEEE, Institute of Electrical and Electronics Engineers. 2013. p. 1-6. (WPMC 2013).