Information Technology Reference
In-Depth Information
2.1 Overview of AIS Based Security in WSN
Overview of AIS based Security in WSN: In [10], the authors have proposed SAID
with three-logic-layer architecture. SAID adopt the merits of local, distributive &
cooperative IDS and is self-adaptive for intrusion detection of resource-constraint
WSN. Knowledge base is deployed base station where the complex algorithm for
agent evolution can be computed and intrusion rules can be stored.
2.2 Overview of Keying Based Security in WSN
Due to the factor of initialization phase, WSN need security mechanism to be in
operation before the network deployment. As stated in [12] Node cloning attacks can
be mounted only during deployment since a cloned node cannot initiate the protocol
with success. It can be successfully connected only by acting as a responding node.
Recent progress in implementation of elliptic curve cryptography (ECC) on sensors
proves public key cryptography (PKC) is now feasible for resource constrained
sensors [13]. The performance of PKC based security schemes is still not well
investigated due to the special hardware characteristics.
In [9] the author presents the security enhancement which uses encryption and
decryption with authentication of the packet header to supplement secure packet
transfer. SRTLD solves the problem of producing real random number problem using
random generator function encrypted with mathematical function. The output of
random function is used to encrypt specific header fields in the packet such as source,
destination addresses and packet ID. In this mechanism they assume that each sensor
node is static, aware of its location and the sink is a trusted computing base.
Security in natural inspired routing protocols is still an open issue [4].
3 BIOSARP Security Architecture and Methodology
BIOARP is enriched with an autonomous security management; preliminary work is
illustrated in [14]. We have divided the jobs among the agents. Agent works on two-
layered architecture, agent layer on the top and wireless sensor network on bottom as
shown in Figure 1.
1. Monitoring Agents
2. Decision Agent
3. Defence Agent
Abnormality
Inform ation
Perform
Action
Wireless Sensor Node
Fig. 1. Two layer BIOSARP Self-Security Architecture
The autonomous security module cooperates with the routing management,
neighbour management and power management modules to provide secure autonomous
Search WWH ::




Custom Search