Novel Protection from Internal Attacks in Wireless Sensor Networks
Due to wireless sensor networks are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network, they become part of our dail
- PDF / 244,027 Bytes
- 9 Pages / 439.37 x 666.142 pts Page_size
- 56 Downloads / 169 Views
Abstract Due to wireless sensor networks are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network, they become part of our daily life. However, security threats to WSNs become increasingly diversified and preventions are getting harder and harder due to the open nature of the wireless medium. For example, an adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods are very limited. This is because of internal attack, such as node compromise, becomes another major problem that is different from traditional WSN security problem as it allows an adversary to enter inside the security perimeter of the network. This situation raised a serious challenge for the security of WSNs. In this paper we are investigating internal attacks of wireless sensor networks, with an example of multi-hop and a single sinker, by which we present our novel algorithm with controllable robust protecting from internal attacks of a wireless sensor network. The final experimental works showed that the proposed algorithm does work well at the designed level. Keywords Internal attack · Robust protection · Resiliency of WSN sensor networks · Sensor optimum deployment · Network security
· Wireless
1 Introduction Wireless sensor networks (WSNs) and their applications are becoming part of our daily life, they have a great advantage for various applications in our real life [1], such as habitat monitoring, battlefield surveillance, intelligent agriculture, home X. Huang · M. Ahmed (B) · D. Sharma Faculty of Information Sciences and Engineering, University of Canberra, Bruce, Australia e-mail: [email protected] N. Chaki et al. (eds.), Computer Networks & Communications (NetCom), Lecture Notes in Electrical Engineering 131, DOI: 10.1007/978-1-4614-6154-8_11, © Springer Science+Business Media New York 2013
105
106
X. Huang et al.
automation, etc. However, the properties of WSN inevitably have the natures that are extremely restricted by their resources, including energy, memory, computing complexity, bandwidth, and communication capacity. Normally the base station is a more powerful node, which can be linked to a central station via satellite or internet communication to form a network. There are many deployments for wireless sensor networks depending on various applications, such as, environmental monitoring, volcano detection [1–3], distributed control systems [4], agricultural and farm management [5], detection of radioactive sources [6], and computing platform for tomorrows’ internet [7]. However, the open nature of the wireless medium therefore offers chances for an adversary to easily eavesdrop information from the sensors, or actively do something such as replay or inject fabricated messages. It is well known that for the protection from the some WSNs attacks, various cryptographic methods are widely used but sometimes are not very efficient and ef
Data Loading...