Skip to main content

Novel Protection from Internal Attacks in Wireless Sensor Networks

  • Conference paper
  • First Online:
Computer Networks & Communications (NetCom)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 131))

  • 1735 Accesses

Abstract

Due to wireless sensor networks are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network, they become part of our daily life. However, security threats to WSNs become increasingly diversified and preventions are getting harder and harder due to the open nature of the wireless medium. For example, an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods are very limited. This is because of internal attack, such as node compromise, becomes another major problem that is different from traditional WSN security problem as it allows an adversary to enter inside the security perimeter of the network. This situation raised a serious challenge for the security of WSNs. In this paper we are investigating internal attacks of wireless sensor networks, with an example of multi-hop and a single sinker, by which we present our novel algorithm with controllable robust protecting from internal attacks of a wireless sensor network. The final experimental works showed that the proposed algorithm does work well at the designed level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422

    Article  Google Scholar 

  2. Chung-Kuo C, Overhage JM, Huang J (2005) An application of sensor networks for syndromic surveillance. Proc of Networking, Sensing and Control, pp 191–196

    Google Scholar 

  3. Werner-Allen G, Lorincz K, Ruiz M, Marcillo O, Johnson J, Lees J, Welsh M (2006) Deploying a wireless sensor network on an active volcano. IEEE Internet Comput 10:18–25

    Article  Google Scholar 

  4. Sinopoli B, Sharp C, Schenato L, Schaffert S, Sastry SS (2003) Distributed control applications within sensor networks. Proc IEEE 91:1235–1246

    Article  Google Scholar 

  5. Sikka P, Corke P, Valencia P, Crossman C, Swain D, Bishop-Hurley G (2006) Wireless ad hoc sensor and actuator networks on the farm, Proc of IPSN 2006, pp 492–499

    Google Scholar 

  6. Stephens DL Jr, Peurrung AJ (2004) Detection of moving radioactive sources using sensor networks. IEEE Trans Nuclear Sci 51:2273–2278

    Article  Google Scholar 

  7. Feng Z (2004) Wireless sensor networks: a new computing platform for tomorrow’s Internet. vol 1, pp 1–27

    Google Scholar 

  8. Huang X, Wijesekera S, Sharma D (2009) Fuzzy dynamic switching in quantum key distribution for Wi-Fi networks. In: Proceeding of 6th international conference on Fuzzy systems and knowledge discovery, Tianjin, China, pp 302–306, 14–16 Aug 2009

    Google Scholar 

  9. Huang X, Shah PG, Sharma D (2010) Multi-agent system protecting from attacking with elliptic curve cryptography. In: The 2nd international symposium on intelligent decision technologies, Baltimore, USA, 28–30 July 2010

    Google Scholar 

  10. Huang X, Sharma D (2010) Fuzzy controller for a dynamic window in elliptic curve cryptography wireless networks for scalar multipication APCC 2010. In: The 16th Asia-Pacific conference on communications, Langham Hotel, Auckland, New Zealand, pp 509–514, 31 Oct 3, Nov 2010. ISBN 978-1-4244-8127-9

    Google Scholar 

  11. Karlof C, Wagner D (2003) Secure routing inn wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2–3):293–315

    Article  Google Scholar 

  12. Ochirkhand Erdene-Ochir, Marine Mibier (2010) Fabrice Valois and Apostolos Kountouris, Resiliency of wireless sensor networks: definitions and analyses. In: 17th international conference on, telecommunications. pp 828–835

    Google Scholar 

  13. Huang X, Barralet M, Sharma D (2009) Accuracy of location identification with antenna polarization on RSSI. In: International multi-conference of engineers and computer sciences 2009, IMECS 2009, Hong Kong, p 542, 18–19 March 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Ahmed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Huang, X., Ahmed, M., Sharma, D. (2013). Novel Protection from Internal Attacks in Wireless Sensor Networks. In: Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Computer Networks & Communications (NetCom). Lecture Notes in Electrical Engineering, vol 131. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6154-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-6154-8_11

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-6153-1

  • Online ISBN: 978-1-4614-6154-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics