International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 97 - Issue 14 |
Published: July 2014 |
Authors: Mehdi Harizi, Mehdi Mohtasham Zadeh, Aref Saiahi |
![]() |
Mehdi Harizi, Mehdi Mohtasham Zadeh, Aref Saiahi . Traffic Analysis, a Wise Approach to Detect Compromised Nodes in Wireless Sensor Networks. International Journal of Computer Applications. 97, 14 (July 2014), 6-9. DOI=10.5120/17073-7511
@article{ 10.5120/17073-7511, author = { Mehdi Harizi,Mehdi Mohtasham Zadeh,Aref Saiahi }, title = { Traffic Analysis, a Wise Approach to Detect Compromised Nodes in Wireless Sensor Networks }, journal = { International Journal of Computer Applications }, year = { 2014 }, volume = { 97 }, number = { 14 }, pages = { 6-9 }, doi = { 10.5120/17073-7511 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2014 %A Mehdi Harizi %A Mehdi Mohtasham Zadeh %A Aref Saiahi %T Traffic Analysis, a Wise Approach to Detect Compromised Nodes in Wireless Sensor Networks%T %J International Journal of Computer Applications %V 97 %N 14 %P 6-9 %R 10.5120/17073-7511 %I Foundation of Computer Science (FCS), NY, USA
Existence of self-similarity and repeated patterns in network traffic makes it possible to predict network parameters. This phenomenon can also be seen in behavior of wireless sensor networks. Self-similarity can be used to propose security solutions in computer and sensor networks. However, sensor networks suffer from several constraints such as limited energy, storage capacity and computing power which make it impossible to take advantage of an overwhelming proportion of tested, evaluated and improved mechanisms which are used in computer networks. Kalman filter is a mathematical tool for estimating control system status with low level of computational overhead. Considering network condition in the past time, Kalman filter can estimate network parameters in future. According to accurate and low cost estimations of Kalman filter, it is compatible with constraints of sensor networks. In this research we have used this concept to present an attack detection mechanism. To this end, Kalman filter make decisions base on traffic volumes produced by different nodes. It can be deduced from results that majority of attacks and abnormal conditions can be marked using the proposed mechanism.