Resiliency Controlling of Wireless Sensor Networks for Protecting from Internal Attacks

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

1 Citation (Scopus)

Abstract

A wireless sensor network (WSN) has been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as sound, water contamination, temperature, pressure, motion and other pollutants. However, security threats to WSNs become increasingly diversified, prevention based due to the open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited. For example, node compromise is another major problem of WSN security as it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks with multi-hop and single sinker, by which we can show our novel algorithm with controllable resiliency of wireless sensor networks to ensure the targeted WSN working at the reasonable resiliency level. The final experimental works showed that the proposed algorithm does work well at the designed level
Original languageEnglish
Title of host publication2012 IEEE 26th International, Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW 2012)
EditorsBob Werner
Place of PublicationUSA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1256-1262
Number of pages7
Volume1
ISBN (Print)9780769546766
DOIs
Publication statusPublished - 2012
EventIEEE 26th International Parallel & Distributed Processing Symposium - Shanghai, Shanghai, China
Duration: 21 May 201225 May 2012

Conference

ConferenceIEEE 26th International Parallel & Distributed Processing Symposium
Country/TerritoryChina
CityShanghai
Period21/05/1225/05/12

Fingerprint

Dive into the research topics of 'Resiliency Controlling of Wireless Sensor Networks for Protecting from Internal Attacks'. Together they form a unique fingerprint.

Cite this