Information Technology Reference
In-Depth Information
well-known bio-inspired mechanism is the swarm intelligence (ANT Colony, Particle
swarm), AIS and intercellular information exchange (Molecular biology)[1-4]. Many
of AIS based algorithms, bee inspired algorithms such as BeeAdHoc [5], BiSNET/e
[3] have been reported. However, self-healable security is still an open issue.
Widespread acceptance and adaptation of these protocols in real world wireless
networks would not be possible until their security aspects have thoroughly
investigated [4]. [4] propose misbehaviour detection in nature inspired MANET
protocol, BeeAdHoc.
This paper introduces the architecture for implementing BIOlogical Inspired
Secure Autonomous Routing Protocol (BIOSARP) consist an autonomous security
management module on top of BIOARP [6].This paper is particularly on BIOSARP
autonomous security module. The ACO based routing part BIOARP has been
discussed in [6-8]. BIOSARP is based on the behaviour of human immune system
(HIS). As HIS provides the complete security and protection to human body. The
major aspect of HIS is to detect the anomalies by differentiating between self and
non-self entities. The HIS security is used in the computer world with the name of
artificial immune system (AIS).
General AIS algorithms are very complex and impracticable for WSN. The
proposed AIS for BIOSARP algorithm is the extension of SRTLD [9] and SAID [10].
While implementing BIOSARP, the complexity factor is taken under consideration.
Moreover, the blood brain barrier (BBB) system is enabled in BIOSARP in the
initialization and learning period. These techniques will be accomplished by assigning
each procedure to several groups of agents. These agents will work in a decentralized
way to collect data and/or detect an event on individual nodes and carry data to the
required destination. BIOSARP provides autonomous security, the mechanism
overcomes the message alter, wormhole, sinkhole Sybil, selective forwarding and
HELLO flood attacks.
The next section reviews the related research for self-security using AIS
approaches. Section 3 describes the BIOSARP implementation. Section 4 shows the
results and comparisons. The conclusion and future work are discussed in section 5.
2 Related Research
Wireless sensor nodes are mostly deployed in the unprotected/hostile environment.
Therefore, it is easier for WSN to suffer with a number of attacks, due to sensor nodes
resource constraints and vulnerabilities. These attacks involve signal jamming and
eavesdropping, tempering, spoofing, resource exhaustion, altered or replayed routing
information, selective forwarding, sinkhole attacks, Sybil attacks, wormhole attacks,
flooding attacks and etc [11]. Many papers have proposed prevention
countermeasures of these attacks and the majority of them are based on encryption
and authentication. These prevention measures in WSN can reduce intrusion to some
extent. In this case, intrusion detection system (IDS) can work as second secure
defence of WSN to further reduce attacks and insulate attackers.
Search WWH ::




Custom Search