Novel Protection from Internal Attacks in Wireless Sensor Networks

Xu Huang, Muhammed Ahmed, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contribution

Abstract

Due to wireless sensor networks are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network, they become part of our daily life. However, security threats to WSNs become increasingly diversified and preventions are getting harder and harder due to the open nature of the wireless medium. For example, an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods are very limited. This is because of internal attack, such as node compromise, becomes another major problem that is different from traditional WSN security problem as it allows an adversary to enter inside the security perimeter of the network. This situation raised a serious challenge for the security of WSNs. In this paper we are investigating internal attacks of wireless sensor networks, with an example of multi-hop and a single sinker, by which we present our novel algorithm with controllable robust protecting from internal attacks of a wireless sensor network. The final experimental works showed that the proposed algorithm does work well at the designed level.
Original languageEnglish
Title of host publicationThe Fourth International Conference on Networks & Communications
Subtitle of host publicationNETCOM 2012
EditorsNabendu Chaki, Dhinaharan Nagamalai, Batarajan Meghanathan
Place of PublicationIndia
PublisherSpringer
Pages105-113
Number of pages9
Volume1
ISBN (Electronic)9781461461548
ISBN (Print)9781461461531
DOIs
Publication statusPublished - 2013
EventThe Fourth International Conference an Networks & Communications 2012: NETCOM 2012 - Chennai, Chennai, India
Duration: 22 Dec 201224 Dec 2012

Conference

ConferenceThe Fourth International Conference an Networks & Communications 2012
CountryIndia
CityChennai
Period22/12/1224/12/12

Fingerprint

Wireless sensor networks
Telecommunication networks
Costs

Cite this

Huang, X., Ahmed, M., & Sharma, D. (2013). Novel Protection from Internal Attacks in Wireless Sensor Networks. In N. Chaki, D. Nagamalai, & B. Meghanathan (Eds.), The Fourth International Conference on Networks & Communications: NETCOM 2012 (Vol. 1, pp. 105-113). India: Springer. https://doi.org/10.1007/978-1-4614-6154-8_11
Huang, Xu ; Ahmed, Muhammed ; Sharma, Dharmendra. / Novel Protection from Internal Attacks in Wireless Sensor Networks. The Fourth International Conference on Networks & Communications: NETCOM 2012. editor / Nabendu Chaki ; Dhinaharan Nagamalai ; Batarajan Meghanathan. Vol. 1 India : Springer, 2013. pp. 105-113
@inproceedings{f4309b49265447a4863f49f99c3b8294,
title = "Novel Protection from Internal Attacks in Wireless Sensor Networks",
abstract = "Due to wireless sensor networks are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network, they become part of our daily life. However, security threats to WSNs become increasingly diversified and preventions are getting harder and harder due to the open nature of the wireless medium. For example, an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods are very limited. This is because of internal attack, such as node compromise, becomes another major problem that is different from traditional WSN security problem as it allows an adversary to enter inside the security perimeter of the network. This situation raised a serious challenge for the security of WSNs. In this paper we are investigating internal attacks of wireless sensor networks, with an example of multi-hop and a single sinker, by which we present our novel algorithm with controllable robust protecting from internal attacks of a wireless sensor network. The final experimental works showed that the proposed algorithm does work well at the designed level.",
author = "Xu Huang and Muhammed Ahmed and Dharmendra Sharma",
year = "2013",
doi = "10.1007/978-1-4614-6154-8_11",
language = "English",
isbn = "9781461461531",
volume = "1",
pages = "105--113",
editor = "Nabendu Chaki and Dhinaharan Nagamalai and Batarajan Meghanathan",
booktitle = "The Fourth International Conference on Networks & Communications",
publisher = "Springer",
address = "Netherlands",

}

Huang, X, Ahmed, M & Sharma, D 2013, Novel Protection from Internal Attacks in Wireless Sensor Networks. in N Chaki, D Nagamalai & B Meghanathan (eds), The Fourth International Conference on Networks & Communications: NETCOM 2012. vol. 1, Springer, India, pp. 105-113, The Fourth International Conference an Networks & Communications 2012, Chennai, India, 22/12/12. https://doi.org/10.1007/978-1-4614-6154-8_11

Novel Protection from Internal Attacks in Wireless Sensor Networks. / Huang, Xu; Ahmed, Muhammed; Sharma, Dharmendra.

The Fourth International Conference on Networks & Communications: NETCOM 2012. ed. / Nabendu Chaki; Dhinaharan Nagamalai; Batarajan Meghanathan. Vol. 1 India : Springer, 2013. p. 105-113.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - Novel Protection from Internal Attacks in Wireless Sensor Networks

AU - Huang, Xu

AU - Ahmed, Muhammed

AU - Sharma, Dharmendra

PY - 2013

Y1 - 2013

N2 - Due to wireless sensor networks are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network, they become part of our daily life. However, security threats to WSNs become increasingly diversified and preventions are getting harder and harder due to the open nature of the wireless medium. For example, an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods are very limited. This is because of internal attack, such as node compromise, becomes another major problem that is different from traditional WSN security problem as it allows an adversary to enter inside the security perimeter of the network. This situation raised a serious challenge for the security of WSNs. In this paper we are investigating internal attacks of wireless sensor networks, with an example of multi-hop and a single sinker, by which we present our novel algorithm with controllable robust protecting from internal attacks of a wireless sensor network. The final experimental works showed that the proposed algorithm does work well at the designed level.

AB - Due to wireless sensor networks are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network, they become part of our daily life. However, security threats to WSNs become increasingly diversified and preventions are getting harder and harder due to the open nature of the wireless medium. For example, an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods are very limited. This is because of internal attack, such as node compromise, becomes another major problem that is different from traditional WSN security problem as it allows an adversary to enter inside the security perimeter of the network. This situation raised a serious challenge for the security of WSNs. In this paper we are investigating internal attacks of wireless sensor networks, with an example of multi-hop and a single sinker, by which we present our novel algorithm with controllable robust protecting from internal attacks of a wireless sensor network. The final experimental works showed that the proposed algorithm does work well at the designed level.

U2 - 10.1007/978-1-4614-6154-8_11

DO - 10.1007/978-1-4614-6154-8_11

M3 - Conference contribution

SN - 9781461461531

VL - 1

SP - 105

EP - 113

BT - The Fourth International Conference on Networks & Communications

A2 - Chaki, Nabendu

A2 - Nagamalai, Dhinaharan

A2 - Meghanathan, Batarajan

PB - Springer

CY - India

ER -

Huang X, Ahmed M, Sharma D. Novel Protection from Internal Attacks in Wireless Sensor Networks. In Chaki N, Nagamalai D, Meghanathan B, editors, The Fourth International Conference on Networks & Communications: NETCOM 2012. Vol. 1. India: Springer. 2013. p. 105-113 https://doi.org/10.1007/978-1-4614-6154-8_11