Abstract
Due to wireless sensor networks are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network, they become part of our daily life. However, security threats to WSNs become increasingly diversified and preventions are getting harder and harder due to the open nature of the wireless medium. For example, an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods are very limited. This is because of internal attack, such as node compromise, becomes another major problem that is different from traditional WSN security problem as it allows an adversary to enter inside the security perimeter of the network. This situation raised a serious challenge for the security of WSNs. In this paper we are investigating internal attacks of wireless sensor networks, with an example of multi-hop and a single sinker, by which we present our novel algorithm with controllable robust protecting from internal attacks of a wireless sensor network. The final experimental works showed that the proposed algorithm does work well at the designed level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422
Chung-Kuo C, Overhage JM, Huang J (2005) An application of sensor networks for syndromic surveillance. Proc of Networking, Sensing and Control, pp 191–196
Werner-Allen G, Lorincz K, Ruiz M, Marcillo O, Johnson J, Lees J, Welsh M (2006) Deploying a wireless sensor network on an active volcano. IEEE Internet Comput 10:18–25
Sinopoli B, Sharp C, Schenato L, Schaffert S, Sastry SS (2003) Distributed control applications within sensor networks. Proc IEEE 91:1235–1246
Sikka P, Corke P, Valencia P, Crossman C, Swain D, Bishop-Hurley G (2006) Wireless ad hoc sensor and actuator networks on the farm, Proc of IPSN 2006, pp 492–499
Stephens DL Jr, Peurrung AJ (2004) Detection of moving radioactive sources using sensor networks. IEEE Trans Nuclear Sci 51:2273–2278
Feng Z (2004) Wireless sensor networks: a new computing platform for tomorrow’s Internet. vol 1, pp 1–27
Huang X, Wijesekera S, Sharma D (2009) Fuzzy dynamic switching in quantum key distribution for Wi-Fi networks. In: Proceeding of 6th international conference on Fuzzy systems and knowledge discovery, Tianjin, China, pp 302–306, 14–16 Aug 2009
Huang X, Shah PG, Sharma D (2010) Multi-agent system protecting from attacking with elliptic curve cryptography. In: The 2nd international symposium on intelligent decision technologies, Baltimore, USA, 28–30 July 2010
Huang X, Sharma D (2010) Fuzzy controller for a dynamic window in elliptic curve cryptography wireless networks for scalar multipication APCC 2010. In: The 16th Asia-Pacific conference on communications, Langham Hotel, Auckland, New Zealand, pp 509–514, 31 Oct 3, Nov 2010. ISBN 978-1-4244-8127-9
Karlof C, Wagner D (2003) Secure routing inn wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2–3):293–315
Ochirkhand Erdene-Ochir, Marine Mibier (2010) Fabrice Valois and Apostolos Kountouris, Resiliency of wireless sensor networks: definitions and analyses. In: 17th international conference on, telecommunications. pp 828–835
Huang X, Barralet M, Sharma D (2009) Accuracy of location identification with antenna polarization on RSSI. In: International multi-conference of engineers and computer sciences 2009, IMECS 2009, Hong Kong, p 542, 18–19 March 2009
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Huang, X., Ahmed, M., Sharma, D. (2013). Novel Protection from Internal Attacks in Wireless Sensor Networks. In: Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Computer Networks & Communications (NetCom). Lecture Notes in Electrical Engineering, vol 131. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6154-8_11
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6154-8_11
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6153-1
Online ISBN: 978-1-4614-6154-8
eBook Packages: EngineeringEngineering (R0)