Abstract
Security evaluation for wireless sensor networks analyzes the security performance of network, helps to find vulnerabilities and shortages, and provides advices to take effective security technologies, which is an important way to improve the security of the network proactively. Considering that the evaluation is a complex process and involves many factors, this paper proposes a security evaluation method for the wireless sensor networks based on fuzzy comprehensive judgement. First, we establish an evaluation index system based on proactive attack, which reflects the security performance objectively and truly. Second, we determine the index weights adopting the analytic hierarchy process method, which can reduce the subjectivity of weights decision. Third, we adopt the fuzzy comprehensive evaluation method to evaluate the security performance qualitatively and quantitatively. Finally, this method is proved to be reasonable and effective in simulation experiments.
The paper is sponsored by the National High Technology Research and Development Program of China (863 Program) (No. 2011AA0401), National Natural Science Foundation of China (No. 61003251, 61173150), Doctoral Fund of Ministry of Education of China (No. 20100006110015), the Fundamental Research Funds for the Central Universities (No. 2302012FRF-TP-12-085A) and Project for Research Center of Beijing Municipal Education Commission.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Du X, Chen HH (2008) Security in wireless sensor networks. IEEE Wirel Commun 15(4):60–66
Ashraf A, Hashmani M, Chowdhry BS, Mussadiq M, Gee Q, Rajput AQK (2008) Design and analysis of the security assessment framework for achieving discrete security values in wireless sensor networks. Paper presented at Canadian conference on electrical and computer engineering
Lv Z, Zhang J, Zhang J (2005) Research on network security leak scan and vulnerability analysis. Aeronaut Comput Tech 35(2):118–121
Zhao DM, Liu JX, Zhang ZH (2009) Method of risk evaluation of information security based on neural networks. Paper presented at 2009 international conference on machine learning and cybernetics, vol 2, July 2009
Jia W, Lian YF, Feng DG, Chen S (2008) Bayesian network approximate reasoning based method for network vulnerabilities evaluation. J Commun 29(10):191–198
Zhang Y, Xian M, Wang G (2004) A quantitative evaluation technique of attack effect of computer network based on network entropy. J Commun 25(11):158–165
Chen C, He Z, Jia J, Kuang J, Zhang Z (2012) Fuzzy evaluation algorithm for system effectiveness of wireless sensor networks. Paper presented at 2012 IEEE global high tech congress on electronics (GHTCE)
Liu D, Yang S (2009) An information system security risk assessment model based on fuzzy analytic hierarchy process. Paper presented at international conference on e-business and information system security, 2009 (EBISS ’09)
Zhang R, Huang L, Xiao M (2010) Security evaluation for wireless network based on fuzzy-AHP with variable weight. Paper presented at 2010 second international conference on networks security wireless communications and trusted computing (NSWCTC)
Zhao D, Ma J, Wang Y (2007) Model of fuzzy risk assessment of the information system. J Commun 28(4):51–56
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, X., Zhang, X., Qi, Y., He, L., Xiahou, Z., Li, C. (2014). Security Evaluation for Wireless Sensor Networks Based on Attack Test and Fuzzy Comprehensive Judgement. In: Wang, X., Cui, L., Guo, Z. (eds) Advanced Technologies in Ad Hoc and Sensor Networks. Lecture Notes in Electrical Engineering, vol 295. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54174-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-54174-2_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54173-5
Online ISBN: 978-3-642-54174-2
eBook Packages: EngineeringEngineering (R0)