Novel Protection from Internal Attacks in Wireless Sensor Networks

  • Xu Huang
  • Muhammad Ahmed
  • Dharmendra Sharma
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 131)


Due to wireless sensor networks are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network, they become part of our daily life. However, security threats to WSNs become increasingly diversified and preventions are getting harder and harder due to the open nature of the wireless medium. For example, an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods are very limited. This is because of internal attack, such as node compromise, becomes another major problem that is different from traditional WSN security problem as it allows an adversary to enter inside the security perimeter of the network. This situation raised a serious challenge for the security of WSNs. In this paper we are investigating internal attacks of wireless sensor networks, with an example of multi-hop and a single sinker, by which we present our novel algorithm with controllable robust protecting from internal attacks of a wireless sensor network. The final experimental works showed that the proposed algorithm does work well at the designed level.


Internal attack Robust protection Resiliency of WSN Wireless sensor networks Sensor optimum deployment  Network security 


  1. 1.
    Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRefGoogle Scholar
  2. 2.
    Chung-Kuo C, Overhage JM, Huang J (2005) An application of sensor networks for syndromic surveillance. Proc of Networking, Sensing and Control, pp 191–196Google Scholar
  3. 3.
    Werner-Allen G, Lorincz K, Ruiz M, Marcillo O, Johnson J, Lees J, Welsh M (2006) Deploying a wireless sensor network on an active volcano. IEEE Internet Comput 10:18–25CrossRefGoogle Scholar
  4. 4.
    Sinopoli B, Sharp C, Schenato L, Schaffert S, Sastry SS (2003) Distributed control applications within sensor networks. Proc IEEE 91:1235–1246CrossRefGoogle Scholar
  5. 5.
    Sikka P, Corke P, Valencia P, Crossman C, Swain D, Bishop-Hurley G (2006) Wireless ad hoc sensor and actuator networks on the farm, Proc of IPSN 2006, pp 492–499Google Scholar
  6. 6.
    Stephens DL Jr, Peurrung AJ (2004) Detection of moving radioactive sources using sensor networks. IEEE Trans Nuclear Sci 51:2273–2278CrossRefGoogle Scholar
  7. 7.
    Feng Z (2004) Wireless sensor networks: a new computing platform for tomorrow’s Internet. vol 1, pp 1–27Google Scholar
  8. 8.
    Huang X, Wijesekera S, Sharma D (2009) Fuzzy dynamic switching in quantum key distribution for Wi-Fi networks. In: Proceeding of 6th international conference on Fuzzy systems and knowledge discovery, Tianjin, China, pp 302–306, 14–16 Aug 2009Google Scholar
  9. 9.
    Huang X, Shah PG, Sharma D (2010) Multi-agent system protecting from attacking with elliptic curve cryptography. In: The 2nd international symposium on intelligent decision technologies, Baltimore, USA, 28–30 July 2010Google Scholar
  10. 10.
    Huang X, Sharma D (2010) Fuzzy controller for a dynamic window in elliptic curve cryptography wireless networks for scalar multipication APCC 2010. In: The 16th Asia-Pacific conference on communications, Langham Hotel, Auckland, New Zealand, pp 509–514, 31 Oct 3, Nov 2010. ISBN 978-1-4244-8127-9Google Scholar
  11. 11.
    Karlof C, Wagner D (2003) Secure routing inn wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2–3):293–315CrossRefGoogle Scholar
  12. 12.
    Ochirkhand Erdene-Ochir, Marine Mibier (2010) Fabrice Valois and Apostolos Kountouris, Resiliency of wireless sensor networks: definitions and analyses. In: 17th international conference on, telecommunications. pp 828–835Google Scholar
  13. 13.
    Huang X, Barralet M, Sharma D (2009) Accuracy of location identification with antenna polarization on RSSI. In: International multi-conference of engineers and computer sciences 2009, IMECS 2009, Hong Kong, p 542, 18–19 March 2009Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Faculty of Information Sciences and EngineeringUniversity of CanberraBruceAustralia

Personalised recommendations