Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks

Xu Huang, Dharmendra Sharma, Muhammed Ahmed

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    Abstract

    Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their open nature. An adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited. For example, node compromise, another major problem of WSNs security, raised a serious challenge for WSNs as it allows an adversary to enter inside the security perimeter of the network. This paper is focusing on investigating internal attacks of distributed wireless sensor networks with multi-hop and single sinker, where we show our novel algorithm, with our new concept of controllable resiliency of WSNs, to ensure the targeted WSN always running at the designed resiliency level. The final experimental and simulation results showed that that the proposed algorithm does work well at the designed level
    Original languageEnglish
    Title of host publicationAlgorithms and architectures for parallel processing
    Subtitle of host publication12th International Conference, ICA3PP 2012
    EditorsYang Xiang, Ivan Stojmenovic, Bernady O Apduhan, Guojun Wang, Koji Nakano, Albert Zomaya
    Place of PublicationJapan
    PublisherSpringer
    Pages16-29
    Number of pages14
    Volume1
    ISBN (Print)9783642330773
    DOIs
    Publication statusPublished - 2012
    Event12th International Conference on Algorithms and Architectures for Parallel Processing ICA3PP 2012: ICA3PP 2012 - Fukuoka, Fukuoka, Japan
    Duration: 4 Sep 20127 Sep 2012
    http://nsclab.org/ica3pp12/

    Conference

    Conference12th International Conference on Algorithms and Architectures for Parallel Processing ICA3PP 2012
    Abbreviated titleICA3PP 2012
    CountryJapan
    CityFukuoka
    Period4/09/127/09/12
    OtherICA3PP 2012 is the 12th in this series of conferences started in 1995 that are devoted to algorithms and architectures for parallel processing. ICA3PP is now recognized as the main regular event of the world that is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for countries around the world to exchange ideas for improving the computation power of computing systems.
    Following the traditions of the previous successful ICA3PP conferences held in Hangzhou, Brisbane, Singapore, Melbourne, Hong Kong, Beijing, Cyprus, Taipei, Busan, and Melbourne, ICA3PP 2012 will be held in Fukuoka, Japan. The objective of ICA3PP 2012 is to bring together researchers and practitioners from academia, industry and governments to advance the theories and technologies in parallel and distributed computing. ICA3PP 2012 will focus on two broad areas of parallel and distributed computing, i.e., architectures, algorithms and networks, and systems and applications. The conference of ICA3PP 2012 will be organized by Kyushu Sangyo University, Japan
    Internet address

    Fingerprint

    Wireless sensor networks
    Network security
    Sensors

    Cite this

    Huang, X., Sharma, D., & Ahmed, M. (2012). Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks. In Y. Xiang, I. Stojmenovic, B. O. Apduhan, G. Wang, K. Nakano, & A. Zomaya (Eds.), Algorithms and architectures for parallel processing: 12th International Conference, ICA3PP 2012 (Vol. 1, pp. 16-29). Japan: Springer. https://doi.org/10.1007/978-3-642-33078-0_2
    Huang, Xu ; Sharma, Dharmendra ; Ahmed, Muhammed. / Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks. Algorithms and architectures for parallel processing: 12th International Conference, ICA3PP 2012. editor / Yang Xiang ; Ivan Stojmenovic ; Bernady O Apduhan ; Guojun Wang ; Koji Nakano ; Albert Zomaya. Vol. 1 Japan : Springer, 2012. pp. 16-29
    @inproceedings{aa6b7e638aa549e9acf784ab4f9628d4,
    title = "Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks",
    abstract = "Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their open nature. An adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited. For example, node compromise, another major problem of WSNs security, raised a serious challenge for WSNs as it allows an adversary to enter inside the security perimeter of the network. This paper is focusing on investigating internal attacks of distributed wireless sensor networks with multi-hop and single sinker, where we show our novel algorithm, with our new concept of controllable resiliency of WSNs, to ensure the targeted WSN always running at the designed resiliency level. The final experimental and simulation results showed that that the proposed algorithm does work well at the designed level",
    author = "Xu Huang and Dharmendra Sharma and Muhammed Ahmed",
    year = "2012",
    doi = "10.1007/978-3-642-33078-0_2",
    language = "English",
    isbn = "9783642330773",
    volume = "1",
    pages = "16--29",
    editor = "Yang Xiang and Ivan Stojmenovic and Apduhan, {Bernady O} and Guojun Wang and Koji Nakano and Albert Zomaya",
    booktitle = "Algorithms and architectures for parallel processing",
    publisher = "Springer",
    address = "Netherlands",

    }

    Huang, X, Sharma, D & Ahmed, M 2012, Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks. in Y Xiang, I Stojmenovic, BO Apduhan, G Wang, K Nakano & A Zomaya (eds), Algorithms and architectures for parallel processing: 12th International Conference, ICA3PP 2012. vol. 1, Springer, Japan, pp. 16-29, 12th International Conference on Algorithms and Architectures for Parallel Processing ICA3PP 2012, Fukuoka, Japan, 4/09/12. https://doi.org/10.1007/978-3-642-33078-0_2

    Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks. / Huang, Xu; Sharma, Dharmendra; Ahmed, Muhammed.

    Algorithms and architectures for parallel processing: 12th International Conference, ICA3PP 2012. ed. / Yang Xiang; Ivan Stojmenovic; Bernady O Apduhan; Guojun Wang; Koji Nakano; Albert Zomaya. Vol. 1 Japan : Springer, 2012. p. 16-29.

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    TY - GEN

    T1 - Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks

    AU - Huang, Xu

    AU - Sharma, Dharmendra

    AU - Ahmed, Muhammed

    PY - 2012

    Y1 - 2012

    N2 - Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their open nature. An adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited. For example, node compromise, another major problem of WSNs security, raised a serious challenge for WSNs as it allows an adversary to enter inside the security perimeter of the network. This paper is focusing on investigating internal attacks of distributed wireless sensor networks with multi-hop and single sinker, where we show our novel algorithm, with our new concept of controllable resiliency of WSNs, to ensure the targeted WSN always running at the designed resiliency level. The final experimental and simulation results showed that that the proposed algorithm does work well at the designed level

    AB - Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their open nature. An adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited. For example, node compromise, another major problem of WSNs security, raised a serious challenge for WSNs as it allows an adversary to enter inside the security perimeter of the network. This paper is focusing on investigating internal attacks of distributed wireless sensor networks with multi-hop and single sinker, where we show our novel algorithm, with our new concept of controllable resiliency of WSNs, to ensure the targeted WSN always running at the designed resiliency level. The final experimental and simulation results showed that that the proposed algorithm does work well at the designed level

    U2 - 10.1007/978-3-642-33078-0_2

    DO - 10.1007/978-3-642-33078-0_2

    M3 - Conference contribution

    SN - 9783642330773

    VL - 1

    SP - 16

    EP - 29

    BT - Algorithms and architectures for parallel processing

    A2 - Xiang, Yang

    A2 - Stojmenovic, Ivan

    A2 - Apduhan, Bernady O

    A2 - Wang, Guojun

    A2 - Nakano, Koji

    A2 - Zomaya, Albert

    PB - Springer

    CY - Japan

    ER -

    Huang X, Sharma D, Ahmed M. Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks. In Xiang Y, Stojmenovic I, Apduhan BO, Wang G, Nakano K, Zomaya A, editors, Algorithms and architectures for parallel processing: 12th International Conference, ICA3PP 2012. Vol. 1. Japan: Springer. 2012. p. 16-29 https://doi.org/10.1007/978-3-642-33078-0_2