首页    期刊浏览 2024年07月05日 星期五
登录注册

文章基本信息

  • 标题:Smart Decision Making for Internal Attacks in Wireless Sensor Network
  • 本地全文:下载
  • 作者:Muhammad R Ahmed ; Xu Huang ; Hongyan Cui
  • 期刊名称:International Journal of Computer Science and Network Security
  • 印刷版ISSN:1738-7906
  • 出版年度:2012
  • 卷号:12
  • 期号:12
  • 页码:15-23
  • 出版社:International Journal of Computer Science and Network Security
  • 摘要:An information procuring and processing emerging technology Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain autonomous nodes. It communicates short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Even though several works have been done to secure WSN, but identification of abnormal behavior to detect internal attacks has not been given much attention. The conventional cryptographic technique does not give the appropriate security to save the network from internal attack. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge as internal attacker behave like legitimate nodes. In this paper, we have proposed a new approach for detecting internal attack in two stages. In the first stage we will do the misbehavior judgment with Abnormal Behavior Identification Mechanism (ABIM) by using cosine similarity. Secondly, we use Dempster-Shafer theory (DST) of combined multiple evidences to identify the malicious or internal attacks in a WSN. The advantage of this method is it does not need the knowledge about the normal or malicious node in advance.
  • 关键词:Wireless Sensor Network (WSN); internal attack; Abnormal Behavior Identification Mechanism (ABIM); Dempester Shafer Theory; Abnormal behavior
国家哲学社会科学文献中心版权所有