Resiliency Controlling of Wireless Sensor Networks for the Protecting from Internal Attacks

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

Abstract

A wireless sensor network (WSN) has been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as sound, water contamination, temperature, pressure, motion and other pollutants. However, security threats to WSNs become increasingly diversified, prevention based due to the open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited. For example, node compromise is another major problem of WSN security as it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks with multi-hop and single sinker, by which we can show our novel algorithm with controllable resiliency of wireless sensor networks to ensure the targeted WSN working at the reasonable resiliency level. The final experimental works showed that the proposed algorithm does work well at the designed level.
Original languageEnglish
Title of host publication2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1256-1262
Number of pages7
ISBN (Print)9781467309745
DOIs
Publication statusPublished - 25 May 2012
Event2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum - Shanghai, China
Duration: 21 May 201225 May 2012

Conference

Conference2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum
Period21/05/1225/05/12

Fingerprint

Dive into the research topics of 'Resiliency Controlling of Wireless Sensor Networks for the Protecting from Internal Attacks'. Together they form a unique fingerprint.

Cite this