Skip to main content

Security Evaluation for Wireless Sensor Networks Based on Attack Test and Fuzzy Comprehensive Judgement

  • Conference paper
  • First Online:
Advanced Technologies in Ad Hoc and Sensor Networks

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 295))

  • 1318 Accesses

Abstract

Security evaluation for wireless sensor networks analyzes the security performance of network, helps to find vulnerabilities and shortages, and provides advices to take effective security technologies, which is an important way to improve the security of the network proactively. Considering that the evaluation is a complex process and involves many factors, this paper proposes a security evaluation method for the wireless sensor networks based on fuzzy comprehensive judgement. First, we establish an evaluation index system based on proactive attack, which reflects the security performance objectively and truly. Second, we determine the index weights adopting the analytic hierarchy process method, which can reduce the subjectivity of weights decision. Third, we adopt the fuzzy comprehensive evaluation method to evaluate the security performance qualitatively and quantitatively. Finally, this method is proved to be reasonable and effective in simulation experiments.

The paper is sponsored by the National High Technology Research and Development Program of China (863 Program) (No. 2011AA0401), National Natural Science Foundation of China (No. 61003251, 61173150), Doctoral Fund of Ministry of Education of China (No. 20100006110015), the Fundamental Research Funds for the Central Universities (No. 2302012FRF-TP-12-085A) and Project for Research Center of Beijing Municipal Education Commission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Du X, Chen HH (2008) Security in wireless sensor networks. IEEE Wirel Commun 15(4):60–66

    Google Scholar 

  2. Ashraf A, Hashmani M, Chowdhry BS, Mussadiq M, Gee Q, Rajput AQK (2008) Design and analysis of the security assessment framework for achieving discrete security values in wireless sensor networks. Paper presented at Canadian conference on electrical and computer engineering

    Google Scholar 

  3. Lv Z, Zhang J, Zhang J (2005) Research on network security leak scan and vulnerability analysis. Aeronaut Comput Tech 35(2):118–121

    Google Scholar 

  4. Zhao DM, Liu JX, Zhang ZH (2009) Method of risk evaluation of information security based on neural networks. Paper presented at 2009 international conference on machine learning and cybernetics, vol 2, July 2009

    Google Scholar 

  5. Jia W, Lian YF, Feng DG, Chen S (2008) Bayesian network approximate reasoning based method for network vulnerabilities evaluation. J Commun 29(10):191–198

    Google Scholar 

  6. Zhang Y, Xian M, Wang G (2004) A quantitative evaluation technique of attack effect of computer network based on network entropy. J Commun 25(11):158–165

    Google Scholar 

  7. Chen C, He Z, Jia J, Kuang J, Zhang Z (2012) Fuzzy evaluation algorithm for system effectiveness of wireless sensor networks. Paper presented at 2012 IEEE global high tech congress on electronics (GHTCE)

    Google Scholar 

  8. Liu D, Yang S (2009) An information system security risk assessment model based on fuzzy analytic hierarchy process. Paper presented at international conference on e-business and information system security, 2009 (EBISS ’09)

    Google Scholar 

  9. Zhang R, Huang L, Xiao M (2010) Security evaluation for wireless network based on fuzzy-AHP with variable weight. Paper presented at 2010 second international conference on networks security wireless communications and trusted computing (NSWCTC)

    Google Scholar 

  10. Zhao D, Ma J, Wang Y (2007) Model of fuzzy risk assessment of the information system. J Commun 28(4):51–56

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaotong Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, X., Zhang, X., Qi, Y., He, L., Xiahou, Z., Li, C. (2014). Security Evaluation for Wireless Sensor Networks Based on Attack Test and Fuzzy Comprehensive Judgement. In: Wang, X., Cui, L., Guo, Z. (eds) Advanced Technologies in Ad Hoc and Sensor Networks. Lecture Notes in Electrical Engineering, vol 295. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54174-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54174-2_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54173-5

  • Online ISBN: 978-3-642-54174-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics