Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

IFIP International Conference on Network and Parallel Computing

NPC 2012: Network and Parallel Computing pp 94–100Cite as

  1. Home
  2. Network and Parallel Computing
  3. Conference paper
Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network

Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network

  • Muhammad Ahmed20,
  • Xu Huang20 &
  • Dharmendra Sharma20 
  • Conference paper
  • 2276 Accesses

  • 4 Citations

Part of the Lecture Notes in Computer Science book series (LNTCS,volume 7513)

Abstract

Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker.

Keywords

  • Wireless Sensor Networks
  • Insider Attacker
  • Security
  • Dempster-shafer theory

Download conference paper PDF

References

  1. Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials (3rd Quarter, 2008)

    Google Scholar 

  2. Staddon, J., Balfanz, D., Durfee, G.: Efficient tracing of failed nodes in sensor networks. In: WSNA 2002, Atlanta, USA, pp. 122–130 (2002)

    Google Scholar 

  3. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: ACM MOBICOM 2000, Boston, USA, pp. 255–265 (August 2000)

    Google Scholar 

  4. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-hoc Networks. In: ACM MOBICOM 2000, Boston, USA, pp. 275–283 (August 2000)

    Google Scholar 

  5. Sentz, K.: Combination of Evidence in Dempester-Shafer Theory. System Science and Engineering Department, Binghamton University, SAND 2002-0835 (April 2002)

    Google Scholar 

  6. Koks, D., Challa, S.: An Introduction to Bayesian and Dempster-Shafer Data Fusion. DSTO Systems Sciences Laboratory, Australia (2005)

    Google Scholar 

  7. Holder, C., Boyles, R., Robinson, P., Raman, S., Fishel, G.: Calculating a daily Normal temperature range that reflects daily temperature variability. American Meteorological Society (June 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Faculty of Information Sciences and Engineering, University of Canberra, Australia

    Muhammad Ahmed, Xu Huang & Dharmendra Sharma

Authors
  1. Muhammad Ahmed
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Xu Huang
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Dharmendra Sharma
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Computer Science and Engineering, SeoulTech, 172 Gongreung 2-dong, Nowon-gu, 139-743, Seoul, Korea

    James J. Park

  2. School of Information Technologies, The University of Sydney, Building J12, 2006, Sydney, NSW, Australia

    Albert Zomaya

  3. Division of Computer Engineering, Mokwon University, 88 Do-An-Buk-Ro, Seo-gu, 302-729, Daejeon, Korea

    Sang-Soo Yeo

  4. Department of Computer and Information Science and Engineering, University of Florida, CSE 301, 32611, Gainesville, FL, USA

    Sartaj Sahni

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 IFIP International Federation for Information Processing

About this paper

Cite this paper

Ahmed, M., Huang, X., Sharma, D. (2012). Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. In: Park, J.J., Zomaya, A., Yeo, SS., Sahni, S. (eds) Network and Parallel Computing. NPC 2012. Lecture Notes in Computer Science, vol 7513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35606-3_11

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-35606-3_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35605-6

  • Online ISBN: 978-3-642-35606-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature