Table of Contents Author Guidelines Submit a Manuscript
Discrete Dynamics in Nature and Society
Volume 2017, Article ID 5743801, 9 pages
https://doi.org/10.1155/2017/5743801
Research Article

A Dynamic Programming Model for Internal Attack Detection in Wireless Sensor Networks

1School of Computer Science and Control Engineering, North University of China, Taiyuan, Shan’xi 030051, China
2School of Instrument and Electronics, North University of China, Taiyuan, Shan’xi 030051, China

Correspondence should be addressed to Qiong Shi; nc.ude.cun@1460gnoiqihs

Received 10 March 2017; Accepted 9 May 2017; Published 1 June 2017

Academic Editor: Lu-Xing Yang

Copyright © 2017 Qiong Shi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Communications Surveys and Tutorials, vol. 8, no. 2, pp. 2–22, 2006. View at Publisher · View at Google Scholar · View at Scopus
  2. A. Liu and P. Ning, “TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks,” in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN '08), pp. 245–256, St. Louis, Mo, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. H. D. Wang, B. Sheng, C. C. Tan, and Q. Li, “Comparing symmetric–key and public–key based security schemes in sensor networks: a case study of user access control,” in Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS '08), pp. 11–18, China, 2008. View at Publisher · View at Google Scholar · View at Scopus
  4. R. H. Wang, W. Du, X. Liu, and P. Ning, “ShortPK: a short–term public key scheme for broadcast authentication in sensor networks,” ACM Transactions on Sensor Networks, vol. 6, no. 1, article 9, pp. 1–29, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. P. Ballarini, L. Mokdad, and Q. Monnet, “Modeling tools for detecting DoS attacks in WSNs,” Security and Communication Networks, vol. 6, no. 4, pp. 420–436, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Location–based compromise–tolerant security mechanisms for wireless sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 247–260, 2006. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Chen, J. Yang, W. Trappe, and R. P. Martin, “Detecting and localizing identity–based attacks in wireless and sensor networks,” IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2418–2434, 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. J. Katiravan, D. N, and D. N, “A two level detection of routing layer attacks in hierarchical wireless sensor networks using learning based energy prediction,” KSII Transactions on Internet and Information Systems, vol. 9, no. 11, pp. 4644–4661, 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Ahmed, K. Abu Bakar, M. . Channa, K. Haseeb, and A. W. Khan, “A survey on trust based detection and isolation of malicious nodes in ad–hoc and sensor networks,” Frontiers in Computer Science, vol. 9, no. 2, pp. 280–296, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  10. Y. Zhang, J. Yang, W. Li, L. Wang, and L. Jin, “An authentication scheme for locating compromised sensor nodes in WSNs,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 50–62, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. A. Al-Riyami, N. Zhang, and J. Keane, “An adaptive early node compromise detection scheme for hierarchical wsns,” IEEE Access, vol. 4, pp. 4183–4206, 2016. View at Publisher · View at Google Scholar
  12. N. Labraoui, M. Gueroui, and L. Sekhri, “A risk–aware reputation–based trust management in wireless sensor networks,” Wireless Personal Communications, vol. 87, no. 3, pp. 1037–1055, 2016. View at Publisher · View at Google Scholar
  13. A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo, “6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach,” International Journal of Communication Systems, vol. 25, no. 9, pp. 1189–1212, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, “Localized multicast: efficient and distributed replica detection in large–scale sensor networks,” IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 913–926, 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. Y. P. Zeng, J. N. Cao, S. G. Zhang, S. Guo, and L. Xie, “Random–walk based approach to detect clone attacks in wireless sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 28, no. 5, pp. 677–691, 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. W. T. Zhu, J. Zhou, R. H. Deng, and F. Bao, “Detecting node replication attacks in wireless sensor networks: a survey,” Journal of Network and Computer Applications, vol. 35, no. 3, pp. 1022–1034, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. W. Z. Khan, M. S. Hossain, M. Y. Aalsalem, N. M. Saad, and M. Atiquzzaman, “A cost analysis framework for claimer reporter witness based clone detection schemes in WSNs,” Journal of Network and Computer Applications, vol. 63, pp. 68–85, 2016. View at Publisher · View at Google Scholar · View at Scopus
  18. S. S. Wang, K. Q. Yan, and C. Liu, “An integrated intrusion detection system for cluster-based wireless sensor networks,” Expert Systems with Applications, vol. 38, no. 12, pp. 15234–15243, 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. I. Almomani, B. Al-Kasasbeh, and M. AL-Akhras, “WSN-DS: a Dataset for intrusion detection systems in wireless sensor networks,” Journal of Sensors, vol. 2016, article 4731953, pp. 1–16, 2016. View at Publisher · View at Google Scholar
  20. N. Labraoui, M. Gueroui, and M. Aliouat, “Secure DV-Hop localization scheme against wormhole attacks in wireless sensor networks,” European Transactions on Telecommunications, vol. 23, no. 4, pp. 303–316, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. L. Song, J. Zhen, G. Sun, J. Zhang, and X. Han, “Influence of removable devices on computer worms: dynamic analysis and control strategies,” Computers and Mathematics with Applications, vol. 61, no. 7, pp. 1823–1829, 2011. View at Publisher · View at Google Scholar · View at Scopus
  22. P. Van Mieghem, J. Omic, and R. Kooij, “Virus spread in networks,” IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1–14, 2009. View at Publisher · View at Google Scholar · View at Scopus
  23. F. D. Sahneh, C. Scoglio, and P. Van Mieghem, “Generalized epidemic mean–field model for spreading processes over multilayer complex networks,” IEEE/ACM Transactions on Networking, vol. 21, no. 5, pp. 1609–1620, 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. X. Yang, Y. Zhu, J. Hong, L.-X. Yang, Y. Wu, and Y. Y. Tang, “The rationality of four metrics of network robustness: a viewpoint of robust growth of generalized meshes,” PLoS ONE, vol. 11, no. 8, Article ID e0161077, 2016. View at Publisher · View at Google Scholar · View at Scopus
  25. L.-X. Yang and X. Yang, “A new epidemic model of computer viruses,” Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 6, pp. 1935–1944, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  26. L.-X. Yang, M. Draief, and X. Yang, “The impact of the network topology on the viral prevalence: a node–based approach,” PLoS ONE, vol. 10, no. 7, article e0134507, 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. R. Pastor-Satorras, C. Castellano, P. Van Mieghem, and A. Vespignani, “Epidemic processes in complex networks,” Reviews of Modern Physics, vol. 87, no. 3, pp. 925–979, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  28. L.-X. Yang, X. Yang, and Y. Wu, “The impact of patch forwarding on the prevalence of computer virus: a theoretical assessment approach,” Applied Mathematical Modelling, vol. 43, pp. 110–125, 2017. View at Publisher · View at Google Scholar · View at MathSciNet
  29. L. Feng, L. Song, Q. Zhao, and H. Wang, “Modeling and stability analysis of worm propagation in wireless sensor network,” Mathematical Problems in Engineering, Article ID 129598, Art. ID 129598, 8 pages, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. M. H. R. Khouzani, S. Sarkar, and E. Altman, “Optimal control of epidemic evolution,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM '11), pp. 1683–1691, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  31. Z. B. He and X. M. Wang, “A spatial–temporal model for the malware propagation in MWSNs based on the reaction–diffusion equations,” in Proceedings of the WAIM 2012 Workshops, pp. 45–56. View at Publisher · View at Google Scholar · View at Scopus
  32. S. Shen, L. Huang, J. Liu, A. C. Champion, S. Yu, and Q. Cao, “Reliability evaluation for clustered WSNs under malware propagation,” Sensors, vol. 16, no. 6, article no. 855, 2016. View at Publisher · View at Google Scholar · View at Scopus
  33. S. Parvin, F. K. Hussain, J. S. Park, and D. S. Kim, “A survivability model in wireless sensor networks,” Computers and Mathematics with Applications, vol. 64, no. 12, pp. 3666–3682, 2012. View at Publisher · View at Google Scholar · View at Scopus
  34. L.-X. Yang, M. Draief, and X. Yang, “The optimal dynamic immunization under a controlled heterogeneous node–based SIRS model,” Physica A., vol. 450, pp. 403–415, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  35. L. Yang, M. Draief, and X. Yang, “Heterogeneous virus propagation in networks: a theoretical study,” Mathematical Methods in the Applied Sciences, vol. 40, no. 5, pp. 1396–1413, 2017. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus