Protecting from inside attacks in wireless sensor networks

Xu Huang, Muhammad Ahmed, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contribution

3 Citations (Scopus)

Abstract

Wireless sensor networks (WSNs) are widely used. They are easily and rapid deployed, low cost, low power, selforganized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. However, for most WSNss the open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some such attacks. But the inside attacks are not detectable with only the classic cryptographic techniques. These attacks mainly include node compromise which is another major problem for WSN security. This allows an adversary to enter inside the security perimeter of the network which raises a serious challenge for WSNs. This paper focusses on investigating inside attacks of WSNs. We show our novel method works well for security under some fixed parameters designed by the network designer. We can also reasonabley predict the highest signal noise ratio (S/N). This method controls the sinker node with period sleeping time period for protecting inside attacks in WSNss. Therefore we may allow a sinker to be open only around a particular time period to receive the signals from the sources while the other time slots are in ⿿sleeping state� to ignore any signals, including the inside attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for a fixed network. We can manipulate the sending rate to control the time when the highest S/N is occurring to protect from ⿿inside attacks� .The simulation results from our novel algorithm are promising.
Original languageEnglish
Title of host publicationIEEE 9th International conference on Dependable, Autonomic Secure Computing
EditorsJiankun Hu, Jong Hyuk Park, Xiao Liu
Place of PublicationSydney
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages186-191
Number of pages6
Volume1
ISBN (Print)9780769546124
DOIs
Publication statusPublished - 2011
EventIEEE 9th International conference on Dependable, Autonomic & Secure Computing - Sydney, Sydney, Australia
Duration: 12 Dec 201114 Dec 2011

Conference

ConferenceIEEE 9th International conference on Dependable, Autonomic & Secure Computing
CountryAustralia
CitySydney
Period12/12/1114/12/11

Fingerprint

Wireless sensor networks
Network security
Telecommunication networks
Costs

Cite this

Huang, X., Ahmed, M., & Sharma, D. (2011). Protecting from inside attacks in wireless sensor networks. In J. Hu, J. H. Park, & X. Liu (Eds.), IEEE 9th International conference on Dependable, Autonomic Secure Computing (Vol. 1, pp. 186-191). Sydney: IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/DASC.2011.52
Huang, Xu ; Ahmed, Muhammad ; Sharma, Dharmendra. / Protecting from inside attacks in wireless sensor networks. IEEE 9th International conference on Dependable, Autonomic Secure Computing. editor / Jiankun Hu ; Jong Hyuk Park ; Xiao Liu. Vol. 1 Sydney : IEEE, Institute of Electrical and Electronics Engineers, 2011. pp. 186-191
@inproceedings{9f0b98071fab4f11b6478feb7c49b317,
title = "Protecting from inside attacks in wireless sensor networks",
abstract = "Wireless sensor networks (WSNs) are widely used. They are easily and rapid deployed, low cost, low power, selforganized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. However, for most WSNss the open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some such attacks. But the inside attacks are not detectable with only the classic cryptographic techniques. These attacks mainly include node compromise which is another major problem for WSN security. This allows an adversary to enter inside the security perimeter of the network which raises a serious challenge for WSNs. This paper focusses on investigating inside attacks of WSNs. We show our novel method works well for security under some fixed parameters designed by the network designer. We can also reasonabley predict the highest signal noise ratio (S/N). This method controls the sinker node with period sleeping time period for protecting inside attacks in WSNss. Therefore we may allow a sinker to be open only around a particular time period to receive the signals from the sources while the other time slots are in {\^a}¿¿sleeping state{\^a}¿� to ignore any signals, including the inside attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for a fixed network. We can manipulate the sending rate to control the time when the highest S/N is occurring to protect from {\^a}¿¿inside attacks{\^a}¿� .The simulation results from our novel algorithm are promising.",
keywords = "Security, Sensor Networks, Computing",
author = "Xu Huang and Muhammad Ahmed and Dharmendra Sharma",
year = "2011",
doi = "10.1109/DASC.2011.52",
language = "English",
isbn = "9780769546124",
volume = "1",
pages = "186--191",
editor = "Jiankun Hu and Park, {Jong Hyuk} and Xiao Liu",
booktitle = "IEEE 9th International conference on Dependable, Autonomic Secure Computing",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
address = "United States",

}

Huang, X, Ahmed, M & Sharma, D 2011, Protecting from inside attacks in wireless sensor networks. in J Hu, JH Park & X Liu (eds), IEEE 9th International conference on Dependable, Autonomic Secure Computing. vol. 1, IEEE, Institute of Electrical and Electronics Engineers, Sydney, pp. 186-191, IEEE 9th International conference on Dependable, Autonomic & Secure Computing, Sydney, Australia, 12/12/11. https://doi.org/10.1109/DASC.2011.52

Protecting from inside attacks in wireless sensor networks. / Huang, Xu; Ahmed, Muhammad; Sharma, Dharmendra.

IEEE 9th International conference on Dependable, Autonomic Secure Computing. ed. / Jiankun Hu; Jong Hyuk Park; Xiao Liu. Vol. 1 Sydney : IEEE, Institute of Electrical and Electronics Engineers, 2011. p. 186-191.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - Protecting from inside attacks in wireless sensor networks

AU - Huang, Xu

AU - Ahmed, Muhammad

AU - Sharma, Dharmendra

PY - 2011

Y1 - 2011

N2 - Wireless sensor networks (WSNs) are widely used. They are easily and rapid deployed, low cost, low power, selforganized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. However, for most WSNss the open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some such attacks. But the inside attacks are not detectable with only the classic cryptographic techniques. These attacks mainly include node compromise which is another major problem for WSN security. This allows an adversary to enter inside the security perimeter of the network which raises a serious challenge for WSNs. This paper focusses on investigating inside attacks of WSNs. We show our novel method works well for security under some fixed parameters designed by the network designer. We can also reasonabley predict the highest signal noise ratio (S/N). This method controls the sinker node with period sleeping time period for protecting inside attacks in WSNss. Therefore we may allow a sinker to be open only around a particular time period to receive the signals from the sources while the other time slots are in ⿿sleeping state� to ignore any signals, including the inside attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for a fixed network. We can manipulate the sending rate to control the time when the highest S/N is occurring to protect from ⿿inside attacks� .The simulation results from our novel algorithm are promising.

AB - Wireless sensor networks (WSNs) are widely used. They are easily and rapid deployed, low cost, low power, selforganized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. However, for most WSNss the open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some such attacks. But the inside attacks are not detectable with only the classic cryptographic techniques. These attacks mainly include node compromise which is another major problem for WSN security. This allows an adversary to enter inside the security perimeter of the network which raises a serious challenge for WSNs. This paper focusses on investigating inside attacks of WSNs. We show our novel method works well for security under some fixed parameters designed by the network designer. We can also reasonabley predict the highest signal noise ratio (S/N). This method controls the sinker node with period sleeping time period for protecting inside attacks in WSNss. Therefore we may allow a sinker to be open only around a particular time period to receive the signals from the sources while the other time slots are in ⿿sleeping state� to ignore any signals, including the inside attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for a fixed network. We can manipulate the sending rate to control the time when the highest S/N is occurring to protect from ⿿inside attacks� .The simulation results from our novel algorithm are promising.

KW - Security

KW - Sensor Networks

KW - Computing

U2 - 10.1109/DASC.2011.52

DO - 10.1109/DASC.2011.52

M3 - Conference contribution

SN - 9780769546124

VL - 1

SP - 186

EP - 191

BT - IEEE 9th International conference on Dependable, Autonomic Secure Computing

A2 - Hu, Jiankun

A2 - Park, Jong Hyuk

A2 - Liu, Xiao

PB - IEEE, Institute of Electrical and Electronics Engineers

CY - Sydney

ER -

Huang X, Ahmed M, Sharma D. Protecting from inside attacks in wireless sensor networks. In Hu J, Park JH, Liu X, editors, IEEE 9th International conference on Dependable, Autonomic Secure Computing. Vol. 1. Sydney: IEEE, Institute of Electrical and Electronics Engineers. 2011. p. 186-191 https://doi.org/10.1109/DASC.2011.52