首页    期刊浏览 2024年07月05日 星期五
登录注册

文章基本信息

  • 标题:Mrakov Chain Monte Carlo Based Internal Attack Evaluation for Wireless Sensor Network
  • 本地全文:下载
  • 作者:Muhammad R Ahmed ; Xu Huang ; Hongyan Cui
  • 期刊名称:International Journal of Computer Science and Network Security
  • 印刷版ISSN:1738-7906
  • 出版年度:2013
  • 卷号:13
  • 期号:3
  • 页码:18-23
  • 出版社:International Journal of Computer Science and Network Security
  • 摘要:Wireless Sensor Networks (WSNs) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack��s node behavioural pattern is different from the other neighbours, called ��good nodes,�� in a system even neighbour nodes can be attacked. In this paper, we have proposed a new approach for detecting internal attack by using Mrakov Chain Monte Carlo (MCMC). It is an efficient real time algorithm. It is good for sensor network as it operates with no or incomplete classification information. Our result shows the output of the internal attacker evaluation.
  • 关键词:Wireless Sensor Network (WSN); internal attack; Markov Chain Monte Carlo; Security.
国家哲学社会科学文献中心版权所有