Inside attacker detection in hierarchical wireless sensor network

Yi Ying Zhang, Wen Cheng Yang, Kee Bum Kim, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Though the security of wireless sensor networks (WSNs) has been studied deeply, the inside attacks still are very difficult to defend. The inside attacks are not detectable with only the classic cryptographic techniques and the attacks mainly include two types of attack: exceptional message attack and abnormal behavior attack. In this paper, we present an inside attacker detection approach, which can efficiently defend these two types of attack. On the one hand, we distinguish the exceptional message using spatiotemporal correlation and consistency in some spatial granularity (e.g. in one cluster); on the other hand, we evaluate the node behavior via a frequency mechanism. Simulation results indicate that our approach can efficiently detect and defend the inside attacker.

Original languageEnglish
Title of host publication3rd International Conference on Innovative Computing Information and Control, ICICIC'08
DOIs
Publication statusPublished - 2008
Event3rd International Conference on Innovative Computing Information and Control, ICICIC'08 - Dalian, Liaoning, China
Duration: 2008 Jun 182008 Jun 20

Publication series

Name3rd International Conference on Innovative Computing Information and Control, ICICIC'08

Other

Other3rd International Conference on Innovative Computing Information and Control, ICICIC'08
Country/TerritoryChina
CityDalian, Liaoning
Period08/6/1808/6/20

ASJC Scopus subject areas

  • Computer Science Applications
  • Software
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Inside attacker detection in hierarchical wireless sensor network'. Together they form a unique fingerprint.

Cite this