Novel Protection from Internal Attacks in Wireless Sensor Networks

Xu Huang, Muhammed Ahmed, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review


Due to wireless sensor networks are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network, they become part of our daily life. However, security threats to WSNs become increasingly diversified and preventions are getting harder and harder due to the open nature of the wireless medium. For example, an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods are very limited. This is because of internal attack, such as node compromise, becomes another major problem that is different from traditional WSN security problem as it allows an adversary to enter inside the security perimeter of the network. This situation raised a serious challenge for the security of WSNs. In this paper we are investigating internal attacks of wireless sensor networks, with an example of multi-hop and a single sinker, by which we present our novel algorithm with controllable robust protecting from internal attacks of a wireless sensor network. The final experimental works showed that the proposed algorithm does work well at the designed level.
Original languageEnglish
Title of host publicationThe Fourth International Conference on Networks & Communications
Subtitle of host publicationNETCOM 2012
EditorsNabendu Chaki, Dhinaharan Nagamalai, Batarajan Meghanathan
Place of PublicationIndia
Number of pages9
ISBN (Electronic)9781461461548
ISBN (Print)9781461461531
Publication statusPublished - 2013
EventThe Fourth International Conference an Networks & Communications 2012: NETCOM 2012 - Chennai, Chennai, India
Duration: 22 Dec 201224 Dec 2012


ConferenceThe Fourth International Conference an Networks & Communications 2012


Dive into the research topics of 'Novel Protection from Internal Attacks in Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this