Hal will be stopped for maintenance from friday on june 10 at 4pm until monday june 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network

Abstract : Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker.
Document type :
Conference papers
Complete list of metadata

Cited literature [7 references]  Display  Hide  Download

Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Friday, June 30, 2017 - 10:35:49 AM
Last modification on : Thursday, March 5, 2020 - 5:40:37 PM
Long-term archiving on: : Monday, January 22, 2018 - 7:09:06 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Muhammad Ahmed, Xu Huang, Dharmendra Sharma. Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. 9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.94-100, ⟨10.1007/978-3-642-35606-3_11⟩. ⟨hal-01551336⟩



Record views


Files downloads