Advertisement

Security Evaluation for Wireless Sensor Networks Based on Attack Test and Fuzzy Comprehensive Judgement

  • Xueying Zhang
  • Xiaotong Zhang
  • Yue Qi
  • Liwen He
  • Zuoxin Xiahou
  • Chunyuan Li
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 295)

Abstract

Security evaluation for wireless sensor networks analyzes the security performance of network, helps to find vulnerabilities and shortages, and provides advices to take effective security technologies, which is an important way to improve the security of the network proactively. Considering that the evaluation is a complex process and involves many factors, this paper proposes a security evaluation method for the wireless sensor networks based on fuzzy comprehensive judgement. First, we establish an evaluation index system based on proactive attack, which reflects the security performance objectively and truly. Second, we determine the index weights adopting the analytic hierarchy process method, which can reduce the subjectivity of weights decision. Third, we adopt the fuzzy comprehensive evaluation method to evaluate the security performance qualitatively and quantitatively. Finally, this method is proved to be reasonable and effective in simulation experiments.

Keywords

Security evaluation Wireless sensor networks Fuzzy comprehensive evaluation Attack test 

References

  1. 1.
    Du X, Chen HH (2008) Security in wireless sensor networks. IEEE Wirel Commun 15(4):60–66Google Scholar
  2. 2.
    Ashraf A, Hashmani M, Chowdhry BS, Mussadiq M, Gee Q, Rajput AQK (2008) Design and analysis of the security assessment framework for achieving discrete security values in wireless sensor networks. Paper presented at Canadian conference on electrical and computer engineeringGoogle Scholar
  3. 3.
    Lv Z, Zhang J, Zhang J (2005) Research on network security leak scan and vulnerability analysis. Aeronaut Comput Tech 35(2):118–121Google Scholar
  4. 4.
    Zhao DM, Liu JX, Zhang ZH (2009) Method of risk evaluation of information security based on neural networks. Paper presented at 2009 international conference on machine learning and cybernetics, vol 2, July 2009Google Scholar
  5. 5.
    Jia W, Lian YF, Feng DG, Chen S (2008) Bayesian network approximate reasoning based method for network vulnerabilities evaluation. J Commun 29(10):191–198Google Scholar
  6. 6.
    Zhang Y, Xian M, Wang G (2004) A quantitative evaluation technique of attack effect of computer network based on network entropy. J Commun 25(11):158–165Google Scholar
  7. 7.
    Chen C, He Z, Jia J, Kuang J, Zhang Z (2012) Fuzzy evaluation algorithm for system effectiveness of wireless sensor networks. Paper presented at 2012 IEEE global high tech congress on electronics (GHTCE)Google Scholar
  8. 8.
    Liu D, Yang S (2009) An information system security risk assessment model based on fuzzy analytic hierarchy process. Paper presented at international conference on e-business and information system security, 2009 (EBISS ’09)Google Scholar
  9. 9.
    Zhang R, Huang L, Xiao M (2010) Security evaluation for wireless network based on fuzzy-AHP with variable weight. Paper presented at 2010 second international conference on networks security wireless communications and trusted computing (NSWCTC)Google Scholar
  10. 10.
    Zhao D, Ma J, Wang Y (2007) Model of fuzzy risk assessment of the information system. J Commun 28(4):51–56MathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Xueying Zhang
    • 1
  • Xiaotong Zhang
    • 1
  • Yue Qi
    • 1
  • Liwen He
    • 1
  • Zuoxin Xiahou
    • 1
  • Chunyuan Li
    • 1
  1. 1.University of Science and Technology BeijingSchool of Computer and Communication EngineeringBeijingChina

Personalised recommendations