Inside attacker detection in hierarchical wireless sensor network

Yi Ying Zhang, Wen Cheng Yang, Kee Bum Kim, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Though the security of wireless sensor networks (WSNs) has been studied deeply, the inside attacks still are very difficult to defend. The inside attacks are not detectable with only the classic cryptographic techniques and the attacks mainly include two types of attack: exceptional message attack and abnormal behavior attack. In this paper, we present an inside attacker detection approach, which can efficiently defend these two types of attack. On the one hand, we distinguish the exceptional message using spatiotemporal correlation and consistency in some spatial granularity (e.g. in one cluster); on the other hand, we evaluate the node behavior via a frequency mechanism. Simulation results indicate that our approach can efficiently detect and defend the inside attacker.

Original languageEnglish
Title of host publication3rd International Conference on Innovative Computing Information and Control, ICICIC'08
DOIs
Publication statusPublished - 2008 Sep 30
Event3rd International Conference on Innovative Computing Information and Control, ICICIC'08 - Dalian, Liaoning, China
Duration: 2008 Jun 182008 Jun 20

Other

Other3rd International Conference on Innovative Computing Information and Control, ICICIC'08
CountryChina
CityDalian, Liaoning
Period08/6/1808/6/20

    Fingerprint

ASJC Scopus subject areas

  • Computer Science Applications
  • Software
  • Control and Systems Engineering

Cite this

Zhang, Y. Y., Yang, W. C., Kim, K. B., & Park, M. S. (2008). Inside attacker detection in hierarchical wireless sensor network. In 3rd International Conference on Innovative Computing Information and Control, ICICIC'08 [4603783] https://doi.org/10.1109/ICICIC.2008.321