Trustability based on beta distribution detecting abnormal behaviour nodes in WSN

Xu HUANG, N. K. Srinath

Research output: A Conference proceeding or a Chapter in BookConference contribution

2 Citations (Scopus)

Abstract

Large numbers of low-power, low-cost, and multifunctional sensor nodes being integrated as a network are improved with wireless communication and electronics updated technologies. Wireless sensor networks (WSN) have been engaged as one of most important parts in our daily life. Common application areas include hospitals, homes, battlefields, and transportation systems. However, nodes deployed in a wireless sensor networks run on batteries with limited power and computation ability. The communication channels can be unreliable and the performance can be vulnerable to attacks and sensor failures such as; wormhole and sinkhole attacks, denial-of-service (DoS), and other pollution attacks. Many algorithms have been published relating to these areas, but few research papers discuss internal attacks. Our major focus in this paper is to ensure the designed networks correct security state, such as if the functions are within the original design. In our proposed algorithm we investigated three scenarios with the trustability based on the beta distribution detecting those nodes in a WSN showing abnormal behaviour. Furthermore, our algorithm can present how weighting is an effective viable security measure in the targeted WSN. Our proposed algorithm does not have any previous information about the target network when it is applied to a WSN. It offers consistent results, detecting malicious nodes with all achieving a trust value inside a 0.003 range within two-hops of the assessing node in a WSN.
Original languageEnglish
Title of host publicationThe 19th Asia-Pacific Conference on communications
EditorsFord Lumban Gao, Iswahyudi Hidayat, Erwin Susanto
Place of PublicationUSA
PublisherAPCC publisher
Pages339-344
Number of pages6
Volume1
ISBN (Print)9781467360487
DOIs
Publication statusPublished - 2013
Event19th Asia-Pacific Conference on communications - Bali, Bali, Indonesia
Duration: 29 Aug 2013 → …

Conference

Conference19th Asia-Pacific Conference on communications
CountryIndonesia
CityBali
Period29/08/13 → …

Fingerprint

Wireless sensor networks
Network security
Sensor nodes
Pollution
Electronic equipment
Communication
Sensors
Costs

Cite this

HUANG, X., & Srinath, N. K. (2013). Trustability based on beta distribution detecting abnormal behaviour nodes in WSN. In F. L. Gao, I. Hidayat, & E. Susanto (Eds.), The 19th Asia-Pacific Conference on communications (Vol. 1, pp. 339-344). USA: APCC publisher. https://doi.org/10.1109/APCC.2013.6765966
HUANG, Xu ; Srinath, N. K. / Trustability based on beta distribution detecting abnormal behaviour nodes in WSN. The 19th Asia-Pacific Conference on communications. editor / Ford Lumban Gao ; Iswahyudi Hidayat ; Erwin Susanto. Vol. 1 USA : APCC publisher, 2013. pp. 339-344
@inproceedings{5bc315a8cced472a92ab06768b28dad9,
title = "Trustability based on beta distribution detecting abnormal behaviour nodes in WSN",
abstract = "Large numbers of low-power, low-cost, and multifunctional sensor nodes being integrated as a network are improved with wireless communication and electronics updated technologies. Wireless sensor networks (WSN) have been engaged as one of most important parts in our daily life. Common application areas include hospitals, homes, battlefields, and transportation systems. However, nodes deployed in a wireless sensor networks run on batteries with limited power and computation ability. The communication channels can be unreliable and the performance can be vulnerable to attacks and sensor failures such as; wormhole and sinkhole attacks, denial-of-service (DoS), and other pollution attacks. Many algorithms have been published relating to these areas, but few research papers discuss internal attacks. Our major focus in this paper is to ensure the designed networks correct security state, such as if the functions are within the original design. In our proposed algorithm we investigated three scenarios with the trustability based on the beta distribution detecting those nodes in a WSN showing abnormal behaviour. Furthermore, our algorithm can present how weighting is an effective viable security measure in the targeted WSN. Our proposed algorithm does not have any previous information about the target network when it is applied to a WSN. It offers consistent results, detecting malicious nodes with all achieving a trust value inside a 0.003 range within two-hops of the assessing node in a WSN.",
keywords = "Trustability, Beta distribution, abnormal WSN",
author = "Xu HUANG and Srinath, {N. K.}",
year = "2013",
doi = "10.1109/APCC.2013.6765966",
language = "English",
isbn = "9781467360487",
volume = "1",
pages = "339--344",
editor = "Gao, {Ford Lumban} and Iswahyudi Hidayat and Erwin Susanto",
booktitle = "The 19th Asia-Pacific Conference on communications",
publisher = "APCC publisher",

}

HUANG, X & Srinath, NK 2013, Trustability based on beta distribution detecting abnormal behaviour nodes in WSN. in FL Gao, I Hidayat & E Susanto (eds), The 19th Asia-Pacific Conference on communications. vol. 1, APCC publisher, USA, pp. 339-344, 19th Asia-Pacific Conference on communications, Bali, Indonesia, 29/08/13. https://doi.org/10.1109/APCC.2013.6765966

Trustability based on beta distribution detecting abnormal behaviour nodes in WSN. / HUANG, Xu; Srinath, N. K.

The 19th Asia-Pacific Conference on communications. ed. / Ford Lumban Gao; Iswahyudi Hidayat; Erwin Susanto. Vol. 1 USA : APCC publisher, 2013. p. 339-344.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - Trustability based on beta distribution detecting abnormal behaviour nodes in WSN

AU - HUANG, Xu

AU - Srinath, N. K.

PY - 2013

Y1 - 2013

N2 - Large numbers of low-power, low-cost, and multifunctional sensor nodes being integrated as a network are improved with wireless communication and electronics updated technologies. Wireless sensor networks (WSN) have been engaged as one of most important parts in our daily life. Common application areas include hospitals, homes, battlefields, and transportation systems. However, nodes deployed in a wireless sensor networks run on batteries with limited power and computation ability. The communication channels can be unreliable and the performance can be vulnerable to attacks and sensor failures such as; wormhole and sinkhole attacks, denial-of-service (DoS), and other pollution attacks. Many algorithms have been published relating to these areas, but few research papers discuss internal attacks. Our major focus in this paper is to ensure the designed networks correct security state, such as if the functions are within the original design. In our proposed algorithm we investigated three scenarios with the trustability based on the beta distribution detecting those nodes in a WSN showing abnormal behaviour. Furthermore, our algorithm can present how weighting is an effective viable security measure in the targeted WSN. Our proposed algorithm does not have any previous information about the target network when it is applied to a WSN. It offers consistent results, detecting malicious nodes with all achieving a trust value inside a 0.003 range within two-hops of the assessing node in a WSN.

AB - Large numbers of low-power, low-cost, and multifunctional sensor nodes being integrated as a network are improved with wireless communication and electronics updated technologies. Wireless sensor networks (WSN) have been engaged as one of most important parts in our daily life. Common application areas include hospitals, homes, battlefields, and transportation systems. However, nodes deployed in a wireless sensor networks run on batteries with limited power and computation ability. The communication channels can be unreliable and the performance can be vulnerable to attacks and sensor failures such as; wormhole and sinkhole attacks, denial-of-service (DoS), and other pollution attacks. Many algorithms have been published relating to these areas, but few research papers discuss internal attacks. Our major focus in this paper is to ensure the designed networks correct security state, such as if the functions are within the original design. In our proposed algorithm we investigated three scenarios with the trustability based on the beta distribution detecting those nodes in a WSN showing abnormal behaviour. Furthermore, our algorithm can present how weighting is an effective viable security measure in the targeted WSN. Our proposed algorithm does not have any previous information about the target network when it is applied to a WSN. It offers consistent results, detecting malicious nodes with all achieving a trust value inside a 0.003 range within two-hops of the assessing node in a WSN.

KW - Trustability

KW - Beta distribution

KW - abnormal WSN

U2 - 10.1109/APCC.2013.6765966

DO - 10.1109/APCC.2013.6765966

M3 - Conference contribution

SN - 9781467360487

VL - 1

SP - 339

EP - 344

BT - The 19th Asia-Pacific Conference on communications

A2 - Gao, Ford Lumban

A2 - Hidayat, Iswahyudi

A2 - Susanto, Erwin

PB - APCC publisher

CY - USA

ER -

HUANG X, Srinath NK. Trustability based on beta distribution detecting abnormal behaviour nodes in WSN. In Gao FL, Hidayat I, Susanto E, editors, The 19th Asia-Pacific Conference on communications. Vol. 1. USA: APCC publisher. 2013. p. 339-344 https://doi.org/10.1109/APCC.2013.6765966