Abstract
Wireless sensor Network (WSN) is known to be vulnerable to variety of attacks due to the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or insider attacker has gained prominence and poses the most challenging attacks to WSN. Many works has been done to secure WSN from internal attacker but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure WSN need to find the internal attacker. Normally, internal attacker node behavioral pattern is different from the other neighbor good nodes in the system, but neighbor node can be attacked as well. In this paper, we use Dempster-Shafer theory (DST) of combined multiple evidence to identify the malicious or internal attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. Moreover, it gives a numerical procedure for fusing together multiple pieces of evidence from unreliable neighbor with higher degree of conflict reliability.
Original language | English |
---|---|
Title of host publication | International Conference on Algorithms and Architectures for Parallel Processing |
Subtitle of host publication | ICA3PP 2012 |
Editors | Yang Xiang, Ivan Stojmenovic, Bernady O Apduhan, Guojun Wang, Koji Nakano, Albert Zomaya |
Place of Publication | Japan |
Publisher | Springer |
Pages | 255-263 |
Number of pages | 9 |
ISBN (Electronic) | 9783642330650 |
ISBN (Print) | 9783642330643 |
DOIs | |
Publication status | Published - 2012 |
Event | 12th International Conference on Algorithms and Architectures for Parallel Processing ICA3PP 2012: ICA3PP 2012 - Fukuoka, Fukuoka, Japan Duration: 4 Sept 2012 → 7 Sept 2012 http://nsclab.org/ica3pp12/ |
Publication series
Name | Lecture Notes in Computer Science - LNCS |
---|---|
Publisher | Springer |
Volume | 7440 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 12th International Conference on Algorithms and Architectures for Parallel Processing ICA3PP 2012 |
---|---|
Abbreviated title | ICA3PP 2012 |
Country/Territory | Japan |
City | Fukuoka |
Period | 4/09/12 → 7/09/12 |
Other | ICA3PP 2012 is the 12th in this series of conferences started in 1995 that are devoted to algorithms and architectures for parallel processing. ICA3PP is now recognized as the main regular event of the world that is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for countries around the world to exchange ideas for improving the computation power of computing systems. Following the traditions of the previous successful ICA3PP conferences held in Hangzhou, Brisbane, Singapore, Melbourne, Hong Kong, Beijing, Cyprus, Taipei, Busan, and Melbourne, ICA3PP 2012 will be held in Fukuoka, Japan. The objective of ICA3PP 2012 is to bring together researchers and practitioners from academia, industry and governments to advance the theories and technologies in parallel and distributed computing. ICA3PP 2012 will focus on two broad areas of parallel and distributed computing, i.e., architectures, algorithms and networks, and systems and applications. The conference of ICA3PP 2012 will be organized by Kyushu Sangyo University, Japan |
Internet address |