Security Evaluation for Wireless Sensor Networks Based on Attack Test and Fuzzy Comprehensive Judgement

  • Conference paper
  • First Online:
Advanced Technologies in Ad Hoc and Sensor Networks

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 295))

  • 1319 Accesses

Abstract

Security evaluation for wireless sensor networks analyzes the security performance of network, helps to find vulnerabilities and shortages, and provides advices to take effective security technologies, which is an important way to improve the security of the network proactively. Considering that the evaluation is a complex process and involves many factors, this paper proposes a security evaluation method for the wireless sensor networks based on fuzzy comprehensive judgement. First, we establish an evaluation index system based on proactive attack, which reflects the security performance objectively and truly. Second, we determine the index weights adopting the analytic hierarchy process method, which can reduce the subjectivity of weights decision. Third, we adopt the fuzzy comprehensive evaluation method to evaluate the security performance qualitatively and quantitatively. Finally, this method is proved to be reasonable and effective in simulation experiments.

The paper is sponsored by the National High Technology Research and Development Program of China (863 Program) (No. 2011AA0401), National Natural Science Foundation of China (No. 61003251, 61173150), Doctoral Fund of Ministry of Education of China (No. 20100006110015), the Fundamental Research Funds for the Central Universities (No. 2302012FRF-TP-12-085A) and Project for Research Center of Bei**g Municipal Education Commission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 103.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 129.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
GBP 129.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Du X, Chen HH (2008) Security in wireless sensor networks. IEEE Wirel Commun 15(4):60–66

    Google Scholar 

  2. Ashraf A, Hashmani M, Chowdhry BS, Mussadiq M, Gee Q, Rajput AQK (2008) Design and analysis of the security assessment framework for achieving discrete security values in wireless sensor networks. Paper presented at Canadian conference on electrical and computer engineering

    Google Scholar 

  3. Lv Z, Zhang J, Zhang J (2005) Research on network security leak scan and vulnerability analysis. Aeronaut Comput Tech 35(2):118–121

    Google Scholar 

  4. Zhao DM, Liu JX, Zhang ZH (2009) Method of risk evaluation of information security based on neural networks. Paper presented at 2009 international conference on machine learning and cybernetics, vol 2, July 2009

    Google Scholar 

  5. Jia W, Lian YF, Feng DG, Chen S (2008) Bayesian network approximate reasoning based method for network vulnerabilities evaluation. J Commun 29(10):191–198

    Google Scholar 

  6. Zhang Y, **an M, Wang G (2004) A quantitative evaluation technique of attack effect of computer network based on network entropy. J Commun 25(11):158–165

    Google Scholar 

  7. Chen C, He Z, Jia J, Kuang J, Zhang Z (2012) Fuzzy evaluation algorithm for system effectiveness of wireless sensor networks. Paper presented at 2012 IEEE global high tech congress on electronics (GHTCE)

    Google Scholar 

  8. Liu D, Yang S (2009) An information system security risk assessment model based on fuzzy analytic hierarchy process. Paper presented at international conference on e-business and information system security, 2009 (EBISS ’09)

    Google Scholar 

  9. Zhang R, Huang L, **ao M (2010) Security evaluation for wireless network based on fuzzy-AHP with variable weight. Paper presented at 2010 second international conference on networks security wireless communications and trusted computing (NSWCTC)

    Google Scholar 

  10. Zhao D, Ma J, Wang Y (2007) Model of fuzzy risk assessment of the information system. J Commun 28(4):51–56

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to **aotong Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, X., Zhang, X., Qi, Y., He, L., **ahou, Z., Li, C. (2014). Security Evaluation for Wireless Sensor Networks Based on Attack Test and Fuzzy Comprehensive Judgement. In: Wang, X., Cui, L., Guo, Z. (eds) Advanced Technologies in Ad Hoc and Sensor Networks. Lecture Notes in Electrical Engineering, vol 295. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54174-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54174-2_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54173-5

  • Online ISBN: 978-3-642-54174-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation