全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Novel Two-Stage Algorithm Protecting Internal Attack from WSNs

Keywords: Wireless Sensor Network , Security , Internal Attack , Cosine similarity , Dempester-Shafer Theory

Full-Text   Cite this paper   Add to My Lib

Abstract:

Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerousapplications with distributed network infrastructure. With its nature and application scenario, security ofWSN had drawn a great attention. In malicious environments for a functional WSN, security mechanismsare essential. Malicious or internal attacker has gained attention as the most challenging attacks toWSNs. Many works have been done to secure WSN from internal attacks but most of them relay on eithertraining data set or predefined thresholds. It is a great challenge to find or gain knowledge about theMalicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal BehaviourIdentification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)isused. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In thismethod we do not need any predefined threshold or tanning data set of the nodes.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133