%0 Conference Proceedings %T Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network %+ University of Canberra %A Ahmed, Muhammad %A Huang, Xu %A Sharma, Dharmendra %Z Part 3: Network Security %< avec comité de lecture %( Lecture Notes in Computer Science %B 9th International Conference on Network and Parallel Computing (NPC) %C Gwangju, South Korea %Y James J. Park %Y Albert Zomaya %Y Sang-Soo Yeo %Y Sartaj Sahni %I Springer %3 Network and Parallel Computing %V LNCS-7513 %P 94-100 %8 2012-09-06 %D 2012 %R 10.1007/978-3-642-35606-3_11 %K Insider Attacker %K Security %K Dempster-shafer theory %K Wireless Sensor Networks %Z Computer Science [cs]Conference papers %X Due to the construction and network infrastructure of wireless sensor network (WSN) are known to be vulnerable to variety of attacks. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Several works have been done to secure WSN, but identification of insider attacker has not been given much attention. In the WSN system the malicious node behavior is different from the neighbor nodes. Instead of relying the untrustworthy neighbor node we use Dempster-Shafer theory (DST) of combined evidence to identify the insider attacker in WSN. This theory reflects with the uncertain event or uncertainty as well as uncertainty of the observation. The mathematical calculation shows the DST capability of identifying the insider attacker. %G English %Z TC 10 %Z WG 10.3 %2 https://inria.hal.science/hal-01551336/document %2 https://inria.hal.science/hal-01551336/file/978-3-642-35606-3_11_Chapter.pdf %L hal-01551336 %U https://inria.hal.science/hal-01551336 %~ IFIP-LNCS %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC10 %~ IFIP-NPC %~ IFIP-WG10-3 %~ IFIP-LNCS-7513