期刊名称:International Journal of Computer Science and Network Security
印刷版ISSN:1738-7906
出版年度:2012
卷号:12
期号:12
页码:15-23
出版社:International Journal of Computer Science and Network Security
摘要:An information procuring and processing emerging technology Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain autonomous nodes. It communicates short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Even though several works have been done to secure WSN, but identification of abnormal behavior to detect internal attacks has not been given much attention. The conventional cryptographic technique does not give the appropriate security to save the network from internal attack. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge as internal attacker behave like legitimate nodes. In this paper, we have proposed a new approach for detecting internal attack in two stages. In the first stage we will do the misbehavior judgment with Abnormal Behavior Identification Mechanism (ABIM) by using cosine similarity. Secondly, we use Dempster-Shafer theory (DST) of combined multiple evidences to identify the malicious or internal attacks in a WSN. The advantage of this method is it does not need the knowledge about the normal or malicious node in advance.