Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks

Xu Huang, Dharmendra Sharma, Muhammed Ahmed

Research output: A Conference proceeding or a Chapter in BookConference contribution

Abstract

Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their open nature. An adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited. For example, node compromise, another major problem of WSNs security, raised a serious challenge for WSNs as it allows an adversary to enter inside the security perimeter of the network. This paper is focusing on investigating internal attacks of distributed wireless sensor networks with multi-hop and single sinker, where we show our novel algorithm, with our new concept of controllable resiliency of WSNs, to ensure the targeted WSN always running at the designed resiliency level. The final experimental and simulation results showed that that the proposed algorithm does work well at the designed level
Original languageEnglish
Title of host publicationAlgorithms and architectures for parallel processing
Subtitle of host publication12th International Conference, ICA3PP 2012
EditorsYang Xiang, Ivan Stojmenovic, Bernady O Apduhan, Guojun Wang, Koji Nakano, Albert Zomaya
Place of PublicationJapan
PublisherSpringer
Pages16-29
Number of pages14
Volume1
ISBN (Print)9783642330773
DOIs
Publication statusPublished - 2012
Event12th International Conference on Algorithms and Architectures for Parallel Processing ICA3PP 2012: ICA3PP 2012 - Fukuoka, Fukuoka, Japan
Duration: 4 Sep 20127 Sep 2012
http://nsclab.org/ica3pp12/

Conference

Conference12th International Conference on Algorithms and Architectures for Parallel Processing ICA3PP 2012
Abbreviated titleICA3PP 2012
CountryJapan
CityFukuoka
Period4/09/127/09/12
OtherICA3PP 2012 is the 12th in this series of conferences started in 1995 that are devoted to algorithms and architectures for parallel processing. ICA3PP is now recognized as the main regular event of the world that is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for countries around the world to exchange ideas for improving the computation power of computing systems.
Following the traditions of the previous successful ICA3PP conferences held in Hangzhou, Brisbane, Singapore, Melbourne, Hong Kong, Beijing, Cyprus, Taipei, Busan, and Melbourne, ICA3PP 2012 will be held in Fukuoka, Japan. The objective of ICA3PP 2012 is to bring together researchers and practitioners from academia, industry and governments to advance the theories and technologies in parallel and distributed computing. ICA3PP 2012 will focus on two broad areas of parallel and distributed computing, i.e., architectures, algorithms and networks, and systems and applications. The conference of ICA3PP 2012 will be organized by Kyushu Sangyo University, Japan
Internet address

Fingerprint

Wireless sensor networks
Network security
Sensors

Cite this

Huang, X., Sharma, D., & Ahmed, M. (2012). Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks. In Y. Xiang, I. Stojmenovic, B. O. Apduhan, G. Wang, K. Nakano, & A. Zomaya (Eds.), Algorithms and architectures for parallel processing: 12th International Conference, ICA3PP 2012 (Vol. 1, pp. 16-29). Japan: Springer. https://doi.org/10.1007/978-3-642-33078-0_2
Huang, Xu ; Sharma, Dharmendra ; Ahmed, Muhammed. / Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks. Algorithms and architectures for parallel processing: 12th International Conference, ICA3PP 2012. editor / Yang Xiang ; Ivan Stojmenovic ; Bernady O Apduhan ; Guojun Wang ; Koji Nakano ; Albert Zomaya. Vol. 1 Japan : Springer, 2012. pp. 16-29
@inproceedings{aa6b7e638aa549e9acf784ab4f9628d4,
title = "Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks",
abstract = "Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their open nature. An adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited. For example, node compromise, another major problem of WSNs security, raised a serious challenge for WSNs as it allows an adversary to enter inside the security perimeter of the network. This paper is focusing on investigating internal attacks of distributed wireless sensor networks with multi-hop and single sinker, where we show our novel algorithm, with our new concept of controllable resiliency of WSNs, to ensure the targeted WSN always running at the designed resiliency level. The final experimental and simulation results showed that that the proposed algorithm does work well at the designed level",
author = "Xu Huang and Dharmendra Sharma and Muhammed Ahmed",
year = "2012",
doi = "10.1007/978-3-642-33078-0_2",
language = "English",
isbn = "9783642330773",
volume = "1",
pages = "16--29",
editor = "Yang Xiang and Ivan Stojmenovic and Apduhan, {Bernady O} and Guojun Wang and Koji Nakano and Albert Zomaya",
booktitle = "Algorithms and architectures for parallel processing",
publisher = "Springer",
address = "Netherlands",

}

Huang, X, Sharma, D & Ahmed, M 2012, Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks. in Y Xiang, I Stojmenovic, BO Apduhan, G Wang, K Nakano & A Zomaya (eds), Algorithms and architectures for parallel processing: 12th International Conference, ICA3PP 2012. vol. 1, Springer, Japan, pp. 16-29, 12th International Conference on Algorithms and Architectures for Parallel Processing ICA3PP 2012, Fukuoka, Japan, 4/09/12. https://doi.org/10.1007/978-3-642-33078-0_2

Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks. / Huang, Xu; Sharma, Dharmendra; Ahmed, Muhammed.

Algorithms and architectures for parallel processing: 12th International Conference, ICA3PP 2012. ed. / Yang Xiang; Ivan Stojmenovic; Bernady O Apduhan; Guojun Wang; Koji Nakano; Albert Zomaya. Vol. 1 Japan : Springer, 2012. p. 16-29.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks

AU - Huang, Xu

AU - Sharma, Dharmendra

AU - Ahmed, Muhammed

PY - 2012

Y1 - 2012

N2 - Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their open nature. An adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited. For example, node compromise, another major problem of WSNs security, raised a serious challenge for WSNs as it allows an adversary to enter inside the security perimeter of the network. This paper is focusing on investigating internal attacks of distributed wireless sensor networks with multi-hop and single sinker, where we show our novel algorithm, with our new concept of controllable resiliency of WSNs, to ensure the targeted WSN always running at the designed resiliency level. The final experimental and simulation results showed that that the proposed algorithm does work well at the designed level

AB - Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their open nature. An adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited. For example, node compromise, another major problem of WSNs security, raised a serious challenge for WSNs as it allows an adversary to enter inside the security perimeter of the network. This paper is focusing on investigating internal attacks of distributed wireless sensor networks with multi-hop and single sinker, where we show our novel algorithm, with our new concept of controllable resiliency of WSNs, to ensure the targeted WSN always running at the designed resiliency level. The final experimental and simulation results showed that that the proposed algorithm does work well at the designed level

U2 - 10.1007/978-3-642-33078-0_2

DO - 10.1007/978-3-642-33078-0_2

M3 - Conference contribution

SN - 9783642330773

VL - 1

SP - 16

EP - 29

BT - Algorithms and architectures for parallel processing

A2 - Xiang, Yang

A2 - Stojmenovic, Ivan

A2 - Apduhan, Bernady O

A2 - Wang, Guojun

A2 - Nakano, Koji

A2 - Zomaya, Albert

PB - Springer

CY - Japan

ER -

Huang X, Sharma D, Ahmed M. Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks. In Xiang Y, Stojmenovic I, Apduhan BO, Wang G, Nakano K, Zomaya A, editors, Algorithms and architectures for parallel processing: 12th International Conference, ICA3PP 2012. Vol. 1. Japan: Springer. 2012. p. 16-29 https://doi.org/10.1007/978-3-642-33078-0_2