A Novel Evidential Evaluation For Internal Attacks With Dempster-Shafer Theory in WSN

被引:2
|
作者
Ahmed, Muhammad R. [1 ]
Huang, Xu [1 ,2 ]
Cui, Hongyan [3 ]
机构
[1] Univ Canberra, Fac Informat Sci & Engn, Canberra, ACT 2601, Australia
[2] Univ Canberra, Fac Informat Sci & Engn, Canberra, ACT 2601, Australia
[3] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless Sensor Network (WSN); internal attacks; Security; Dempster-shafer Theory;
D O I
10.1109/TrustCom.2013.276
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. Normally, internal attack's node behavioral pattern is different from the other neighbors, called "good nodes," in a system even neighbor nodes can be attacked. In this paper, we use Dempster-Shafer theory (DST) of combined multiple evidences to identify the malicious or internal attacks in a WSN. Moreover, it gives a numerical procedure for fusing together multiple pieces of evidences from unreliable neighbor with higher degree of conflict reliability.
引用
收藏
页码:688 / 693
页数:6
相关论文
共 50 条
  • [21] 40 years of Dempster-Shafer theory
    Denoeux, Thierry
    [J]. INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2016, 79 : 1 - 6
  • [22] Nonstandard analysis and Dempster-Shafer theory
    Roesmer, C
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2000, 15 (02) : 117 - 127
  • [23] Connectionist based Dempster-Shafer evidential reasoning for data fusion
    Zhu, HW
    Basir, O
    [J]. 2004 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, PROCEEDINGS, 2004, : 351 - 356
  • [24] FAST ALGORITHMS FOR DEMPSTER-SHAFER THEORY
    KENNES, R
    SMETS, P
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 521 : 14 - 23
  • [25] Analyzing a Paradox in Dempster-Shafer Theory
    Xiong, Wei
    [J]. FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 5, PROCEEDINGS, 2008, : 154 - 158
  • [26] Combination rules in Dempster-Shafer theory
    Sentz, K
    Ferson, S
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVI, PROCEEDINGS: COMPUTER SCIENCE III, 2002, : 191 - 196
  • [27] Modelling dependence in dempster-shafer theory
    Monney, Paul-Andre
    Chan, Moses
    [J]. INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2007, 15 (01) : 93 - 114
  • [28] An Evidential Model for Environmental Risk Assessment in Projects Using Dempster-Shafer Theory of Evidence
    Hatefi, Seyed Morteza
    Basiri, Mohammad Ehsan
    Tamosaitiene, Jolanta
    [J]. SUSTAINABILITY, 2019, 11 (22)
  • [29] Uncertainty based on Dempster-Shafer theory
    Xiao, MZ
    Chen, GJ
    [J]. ICEMI'2003: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOLS 1-3, 2003, : 117 - 120
  • [30] The Evidential Reasoning Approach to Medical Diagnosis using Intuitionistic Fuzzy Dempster-Shafer Theory
    Wang, Yanni
    Dai, Yaping
    Chen, Yu-wang
    Meng, Fancheng
    [J]. International Journal of Computational Intelligence Systems, 2015, 8 (01) : 75 - 94