Inside attacker detection in hierarchical wireless sensor network

Yi Ying Zhang, Wen Cheng Yang, Kee Bum Kim, Myong Soon Park

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)

    Abstract

    Though the security of wireless sensor networks (WSNs) has been studied deeply, the inside attacks still are very difficult to defend. The inside attacks are not detectable with only the classic cryptographic techniques and the attacks mainly include two types of attack: exceptional message attack and abnormal behavior attack. In this paper, we present an inside attacker detection approach, which can efficiently defend these two types of attack. On the one hand, we distinguish the exceptional message using spatiotemporal correlation and consistency in some spatial granularity (e.g. in one cluster); on the other hand, we evaluate the node behavior via a frequency mechanism. Simulation results indicate that our approach can efficiently detect and defend the inside attacker.

    Original languageEnglish
    Title of host publication3rd International Conference on Innovative Computing Information and Control, ICICIC'08
    DOIs
    Publication statusPublished - 2008
    Event3rd International Conference on Innovative Computing Information and Control, ICICIC'08 - Dalian, Liaoning, China
    Duration: 2008 Jun 182008 Jun 20

    Publication series

    Name3rd International Conference on Innovative Computing Information and Control, ICICIC'08

    Other

    Other3rd International Conference on Innovative Computing Information and Control, ICICIC'08
    Country/TerritoryChina
    CityDalian, Liaoning
    Period08/6/1808/6/20

    ASJC Scopus subject areas

    • Computer Science Applications
    • Software
    • Control and Systems Engineering

    Fingerprint

    Dive into the research topics of 'Inside attacker detection in hierarchical wireless sensor network'. Together they form a unique fingerprint.

    Cite this