Markov chain Monte Carlo based internal attack evaluation for wireless sensor network

Muhammad Ahmed, Xu HUANG, Hongyan Cui

    Research output: Contribution to journalArticle

    Abstract

    Wireless Sensor Networks (WSNs) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack’s node behavioural pattern is different from the other neighbours, called “good nodes,” in a system even neighbour nodes can be attacked. In this paper, we have proposed a new approach for detecting internal attack by using Mrakov Chain Monte Carlo (MCMC). It is an efficient real time algorithm. It is good for sensor network as it operates with no or incomplete classification information. Our result shows the output of the internal attacker evaluation.
    Original languageEnglish
    Pages (from-to)23-31
    Number of pages9
    JournalInternational Journal of Computer Science and Network Security
    Volume13
    Issue number3
    Publication statusPublished - 2013

    Fingerprint

    Markov processes
    Wireless sensor networks
    Sensor networks
    Telecommunication links
    Health
    Monitoring
    Processing
    Costs

    Cite this

    @article{f1a6202609fc4c0f8ed40b177b5f439e,
    title = "Markov chain Monte Carlo based internal attack evaluation for wireless sensor network",
    abstract = "Wireless Sensor Networks (WSNs) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack’s node behavioural pattern is different from the other neighbours, called “good nodes,” in a system even neighbour nodes can be attacked. In this paper, we have proposed a new approach for detecting internal attack by using Mrakov Chain Monte Carlo (MCMC). It is an efficient real time algorithm. It is good for sensor network as it operates with no or incomplete classification information. Our result shows the output of the internal attacker evaluation.",
    keywords = "WSN, Internal attack, Markov",
    author = "Muhammad Ahmed and Xu HUANG and Hongyan Cui",
    year = "2013",
    language = "English",
    volume = "13",
    pages = "23--31",
    journal = "International Journal of Computer Science and Network Security",
    issn = "1738-7906",
    number = "3",

    }

    Markov chain Monte Carlo based internal attack evaluation for wireless sensor network. / Ahmed, Muhammad; HUANG, Xu; Cui, Hongyan.

    In: International Journal of Computer Science and Network Security, Vol. 13, No. 3, 2013, p. 23-31.

    Research output: Contribution to journalArticle

    TY - JOUR

    T1 - Markov chain Monte Carlo based internal attack evaluation for wireless sensor network

    AU - Ahmed, Muhammad

    AU - HUANG, Xu

    AU - Cui, Hongyan

    PY - 2013

    Y1 - 2013

    N2 - Wireless Sensor Networks (WSNs) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack’s node behavioural pattern is different from the other neighbours, called “good nodes,” in a system even neighbour nodes can be attacked. In this paper, we have proposed a new approach for detecting internal attack by using Mrakov Chain Monte Carlo (MCMC). It is an efficient real time algorithm. It is good for sensor network as it operates with no or incomplete classification information. Our result shows the output of the internal attacker evaluation.

    AB - Wireless Sensor Networks (WSNs) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack’s node behavioural pattern is different from the other neighbours, called “good nodes,” in a system even neighbour nodes can be attacked. In this paper, we have proposed a new approach for detecting internal attack by using Mrakov Chain Monte Carlo (MCMC). It is an efficient real time algorithm. It is good for sensor network as it operates with no or incomplete classification information. Our result shows the output of the internal attacker evaluation.

    KW - WSN

    KW - Internal attack

    KW - Markov

    M3 - Article

    VL - 13

    SP - 23

    EP - 31

    JO - International Journal of Computer Science and Network Security

    JF - International Journal of Computer Science and Network Security

    SN - 1738-7906

    IS - 3

    ER -