Protecting from inside attacks in wireless sensor networks

Xu Huang, Muhammad Ahmed, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contribution

3 Citations (Scopus)

Abstract

Wireless sensor networks (WSNs) are widely used. They are easily and rapid deployed, low cost, low power, selforganized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. However, for most WSNss the open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some such attacks. But the inside attacks are not detectable with only the classic cryptographic techniques. These attacks mainly include node compromise which is another major problem for WSN security. This allows an adversary to enter inside the security perimeter of the network which raises a serious challenge for WSNs. This paper focusses on investigating inside attacks of WSNs. We show our novel method works well for security under some fixed parameters designed by the network designer. We can also reasonabley predict the highest signal noise ratio (S/N). This method controls the sinker node with period sleeping time period for protecting inside attacks in WSNss. Therefore we may allow a sinker to be open only around a particular time period to receive the signals from the sources while the other time slots are in ⿿sleeping state� to ignore any signals, including the inside attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for a fixed network. We can manipulate the sending rate to control the time when the highest S/N is occurring to protect from ⿿inside attacks� .The simulation results from our novel algorithm are promising.
Original languageEnglish
Title of host publicationIEEE 9th International conference on Dependable, Autonomic Secure Computing
EditorsJiankun Hu, Jong Hyuk Park, Xiao Liu
Place of PublicationSydney
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages186-191
Number of pages6
Volume1
ISBN (Print)9780769546124
DOIs
Publication statusPublished - 2011
EventIEEE 9th International conference on Dependable, Autonomic & Secure Computing - Sydney, Sydney, Australia
Duration: 12 Dec 201114 Dec 2011

Conference

ConferenceIEEE 9th International conference on Dependable, Autonomic & Secure Computing
CountryAustralia
CitySydney
Period12/12/1114/12/11

Fingerprint Dive into the research topics of 'Protecting from inside attacks in wireless sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Huang, X., Ahmed, M., & Sharma, D. (2011). Protecting from inside attacks in wireless sensor networks. In J. Hu, J. H. Park, & X. Liu (Eds.), IEEE 9th International conference on Dependable, Autonomic Secure Computing (Vol. 1, pp. 186-191). IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/DASC.2011.52