Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network - Network and Parallel Computing
Conference Papers Year : 2012

Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network

Muhammad Ahmed
  • Function : Author
  • PersonId : 1011238
Xu Huang
  • Function : Author
  • PersonId : 1011239
Dharmendra Sharma
  • Function : Author
  • PersonId : 1011240

Abstract

Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker.
Fichier principal
Vignette du fichier
978-3-642-35606-3_11_Chapter.pdf (65.84 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01551336 , version 1 (30-06-2017)

Licence

Identifiers

Cite

Muhammad Ahmed, Xu Huang, Dharmendra Sharma. Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. 9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.94-100, ⟨10.1007/978-3-642-35606-3_11⟩. ⟨hal-01551336⟩
106 View
121 Download

Altmetric

Share

More