Mrakov Chain Monte Carlo Based Internal Attack Evaluation for Wireless Sensor Network

نویسندگان

  • Muhammad R Ahmed
  • Xu Huang
  • Hongyan Cui
چکیده

Wireless Sensor Networks (WSNs) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack’s node behavioural pattern is different from the other neighbours, called “good nodes,” in a system even neighbour nodes can be attacked. In this paper, we have proposed a new approach for detecting internal attack by using Mrakov Chain Monte Carlo (MCMC). It is an efficient real time algorithm. It is good for sensor network as it operates with no or incomplete classification information. Our result shows the output of the internal attacker evaluation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

Introduction to Model-based Reliability Evaluation of Wireless Sensor Networks

A high level of reliability is a significant requirement for using wireless sensor networks in industrial environments. Model-based evaluation is usually applied in conventional systems to estimate the reliability. In contrast, for analyzing sensor networks, these methods are hardly tested and proven due to the unique properties of that kind of network. This paper presents a first model-based a...

متن کامل

Hypercube Bivariate-Based Key Management for Wireless Sensor Networks

Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...

متن کامل

A Reliability Approach on Redesigning the Warehouses in Supply Chain with Uncertain Parameters via Integrated Monte Carlo Simulation and Tuned Artificial Neural Network

In this paper, a reliability approach on reconfiguration decisions in a supply chain network is studied based on coupling the simulation concepts and artificial neural network. In other words, due to the limited budget for warehouse relocation in a supply chain, the failure probability is assessed for determining the robust decision for future supply chain configuration. Traditional solving ...

متن کامل

Presenting a Hybrid Method to Increase Lifetime of Wireless Sensor Networks Using Effective Determination of Operating Mode of Sensors in Regional Coverage

In recent years Wireless Sensor Networks have attracted researchers' attention due to vast applications. One of the most prominent issues regarding these networks is coverage which is considered as a quality of Service parameter. In this study, we try to address energy shortage in WSNs through finding a set of optimal coverage nodes in a specific environment. This is performed utilizing effecti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013