2017
DOI: 10.1155/2017/5743801
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Programming Model for Internal Attack Detection in Wireless Sensor Networks

Abstract: Internal attack is a crucial security problem of WSN (wireless sensor network). In this paper, we focus on the internal attack detection which is an important way to locate attacks. We propose a state transition model, based on the continuous time Markov chain (CTMC), to study the behaviors of the sensors in a WSN under internal attack. Then we conduct the internal attack detection model as the epidemiological model. In this model, we explore the detection rate as the rate of a compromised state transition to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 35 publications
(33 reference statements)
0
3
0
Order By: Relevance
“…Younis have proposed a novel security attack known as snooze attack on cluster-based routing in WSN. Recently Qiong shi applied an the internal attack detection model as an epidemiological model (32). However most of these models ignore the game process between attackers and the IDS.…”
Section: Intrusion Detection Model Based On Game Theorymentioning
confidence: 99%
“…Younis have proposed a novel security attack known as snooze attack on cluster-based routing in WSN. Recently Qiong shi applied an the internal attack detection model as an epidemiological model (32). However most of these models ignore the game process between attackers and the IDS.…”
Section: Intrusion Detection Model Based On Game Theorymentioning
confidence: 99%
“…When determining the attacker nodes, base station broadcasts blocked messages to the network. Shi et al [22] proposed a state transition model based on the continuous time Markov chain (CTMC), studied the sensor's behavior under internal attacks, and positioned attacks. The model linked the detection model for internal attack with the epidemiological model and considered the current state, viability, availability, and energy consumption of WSN to balance network features and security.…”
Section: Research On Abnormal Detectionmentioning
confidence: 99%
“…The model elaborates the biological differentiation mechanism of dendritic cells [7]. Shi proposed a state transition model based on the continuous time Markov chain to study the behaviors of the sensors in a WSN under internal attack [8]. Yang started from the main idea of changes leading to danger,and established an adaptive danger signal extraction model based on finding changes [9].…”
Section: Introductionmentioning
confidence: 99%