Abstract
Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker.
Keywords
- Wireless Sensor Networks
- Insider Attacker
- Security
- Dempster-shafer theory
Download conference paper PDF
References
Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials (3rd Quarter, 2008)
Staddon, J., Balfanz, D., Durfee, G.: Efficient tracing of failed nodes in sensor networks. In: WSNA 2002, Atlanta, USA, pp. 122–130 (2002)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: ACM MOBICOM 2000, Boston, USA, pp. 255–265 (August 2000)
Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-hoc Networks. In: ACM MOBICOM 2000, Boston, USA, pp. 275–283 (August 2000)
Sentz, K.: Combination of Evidence in Dempester-Shafer Theory. System Science and Engineering Department, Binghamton University, SAND 2002-0835 (April 2002)
Koks, D., Challa, S.: An Introduction to Bayesian and Dempster-Shafer Data Fusion. DSTO Systems Sciences Laboratory, Australia (2005)
Holder, C., Boyles, R., Robinson, P., Raman, S., Fishel, G.: Calculating a daily Normal temperature range that reflects daily temperature variability. American Meteorological Society (June 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Ahmed, M., Huang, X., Sharma, D. (2012). Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. In: Park, J.J., Zomaya, A., Yeo, SS., Sahni, S. (eds) Network and Parallel Computing. NPC 2012. Lecture Notes in Computer Science, vol 7513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35606-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-35606-3_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35605-6
Online ISBN: 978-3-642-35606-3
eBook Packages: Computer ScienceComputer Science (R0)
