Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks

Xu Huang, Muhammed Ahmed, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contribution

9 Citations (Scopus)

Abstract

Wireless sensor networks (WSNs) are widely used due to they are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. It is the fact that due to open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks. However, node compromise is another major problem of WSN security as it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks, by which we show our novel method will work well for the security under some fixed parameters designed by the network designer, we also have reasonable model for predicting the highest signal noise ratio (S/N). “Timing control” method is to be used for protecting internal attacks in SWNs. Therefore we may allow a sinker to be open only around a particular time period to receive the signals from the sources while the other time slots are in “sleeping state” to ignore any signals, including the internal attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for a fixed network. We can easily manipulate the sending rate to control the time when the highest S/N is occurring to protect from “internal attacks.” The simulation results have been shown and they underpinned our novel algorithm.
Original languageEnglish
Title of host publicationProceeding of the International Conference on Information Networking 2012 (ICOIN 2012)
EditorsKi-Hyung Kim, Myungsik Yoo
Place of PublicationKorea
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages7-12
Number of pages6
Volume1
ISBN (Electronic)9781467302500
ISBN (Print)9781467302517
DOIs
Publication statusPublished - 2012
EventInternational Conference on Information Networking 2012 - Bali, Bali, Indonesia
Duration: 1 Feb 20123 Feb 2012

Conference

ConferenceInternational Conference on Information Networking 2012
Abbreviated titleICOIN 2012
CountryIndonesia
CityBali
Period1/02/123/02/12

Fingerprint

Wireless sensor networks
Network security
Telecommunication networks
Costs

Cite this

Huang, X., Ahmed, M., & Sharma, D. (2012). Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks. In K-H. Kim, & M. Yoo (Eds.), Proceeding of the International Conference on Information Networking 2012 (ICOIN 2012) (Vol. 1, pp. 7-12). Korea: IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ICOIN.2012.6164340
Huang, Xu ; Ahmed, Muhammed ; Sharma, Dharmendra. / Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks. Proceeding of the International Conference on Information Networking 2012 (ICOIN 2012). editor / Ki-Hyung Kim ; Myungsik Yoo. Vol. 1 Korea : IEEE, Institute of Electrical and Electronics Engineers, 2012. pp. 7-12
@inproceedings{2b545a1b2fbb427ba27cbfa13d3b0674,
title = "Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks",
abstract = "Wireless sensor networks (WSNs) are widely used due to they are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. It is the fact that due to open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks. However, node compromise is another major problem of WSN security as it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks, by which we show our novel method will work well for the security under some fixed parameters designed by the network designer, we also have reasonable model for predicting the highest signal noise ratio (S/N). “Timing control” method is to be used for protecting internal attacks in SWNs. Therefore we may allow a sinker to be open only around a particular time period to receive the signals from the sources while the other time slots are in “sleeping state” to ignore any signals, including the internal attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for a fixed network. We can easily manipulate the sending rate to control the time when the highest S/N is occurring to protect from “internal attacks.” The simulation results have been shown and they underpinned our novel algorithm.",
author = "Xu Huang and Muhammed Ahmed and Dharmendra Sharma",
year = "2012",
doi = "10.1109/ICOIN.2012.6164340",
language = "English",
isbn = "9781467302517",
volume = "1",
pages = "7--12",
editor = "Ki-Hyung Kim and Myungsik Yoo",
booktitle = "Proceeding of the International Conference on Information Networking 2012 (ICOIN 2012)",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
address = "United States",

}

Huang, X, Ahmed, M & Sharma, D 2012, Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks. in K-H Kim & M Yoo (eds), Proceeding of the International Conference on Information Networking 2012 (ICOIN 2012). vol. 1, IEEE, Institute of Electrical and Electronics Engineers, Korea, pp. 7-12, International Conference on Information Networking 2012, Bali, Indonesia, 1/02/12. https://doi.org/10.1109/ICOIN.2012.6164340

Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks. / Huang, Xu; Ahmed, Muhammed; Sharma, Dharmendra.

Proceeding of the International Conference on Information Networking 2012 (ICOIN 2012). ed. / Ki-Hyung Kim; Myungsik Yoo. Vol. 1 Korea : IEEE, Institute of Electrical and Electronics Engineers, 2012. p. 7-12.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks

AU - Huang, Xu

AU - Ahmed, Muhammed

AU - Sharma, Dharmendra

PY - 2012

Y1 - 2012

N2 - Wireless sensor networks (WSNs) are widely used due to they are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. It is the fact that due to open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks. However, node compromise is another major problem of WSN security as it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks, by which we show our novel method will work well for the security under some fixed parameters designed by the network designer, we also have reasonable model for predicting the highest signal noise ratio (S/N). “Timing control” method is to be used for protecting internal attacks in SWNs. Therefore we may allow a sinker to be open only around a particular time period to receive the signals from the sources while the other time slots are in “sleeping state” to ignore any signals, including the internal attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for a fixed network. We can easily manipulate the sending rate to control the time when the highest S/N is occurring to protect from “internal attacks.” The simulation results have been shown and they underpinned our novel algorithm.

AB - Wireless sensor networks (WSNs) are widely used due to they are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. It is the fact that due to open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks. However, node compromise is another major problem of WSN security as it allows an adversary to enter inside the security perimeter of the network, which raised a serious challenge for WSNs. This paper is focusing on investigating internal attacks of wireless sensor networks, by which we show our novel method will work well for the security under some fixed parameters designed by the network designer, we also have reasonable model for predicting the highest signal noise ratio (S/N). “Timing control” method is to be used for protecting internal attacks in SWNs. Therefore we may allow a sinker to be open only around a particular time period to receive the signals from the sources while the other time slots are in “sleeping state” to ignore any signals, including the internal attacking signal. In particularly, we found the highest S/N timing can be controlled by the sending rating for a fixed network. We can easily manipulate the sending rate to control the time when the highest S/N is occurring to protect from “internal attacks.” The simulation results have been shown and they underpinned our novel algorithm.

U2 - 10.1109/ICOIN.2012.6164340

DO - 10.1109/ICOIN.2012.6164340

M3 - Conference contribution

SN - 9781467302517

VL - 1

SP - 7

EP - 12

BT - Proceeding of the International Conference on Information Networking 2012 (ICOIN 2012)

A2 - Kim, Ki-Hyung

A2 - Yoo, Myungsik

PB - IEEE, Institute of Electrical and Electronics Engineers

CY - Korea

ER -

Huang X, Ahmed M, Sharma D. Timing Control for Protecting from Internal Attacks in Wireless Sensor Networks. In Kim K-H, Yoo M, editors, Proceeding of the International Conference on Information Networking 2012 (ICOIN 2012). Vol. 1. Korea: IEEE, Institute of Electrical and Electronics Engineers. 2012. p. 7-12 https://doi.org/10.1109/ICOIN.2012.6164340