A SURVEY ON BIO-INSPIRED SECURITY IN WIRELESS SENSOR NETWORKS
Abstract
Wireless sensor networks usually comprise of a large number of nodes which are geographically distributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable insights for computer networks. Because of the analogies between network security and how the biotic components react to perceived threats in their surroundings , Bio-inspired approaches for providing security in networks are interesting to evaluate. Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the networking domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach.
FAQs
AI
What types of attacks are commonly identified in wireless sensor networks?
The study identifies key attacks such as jamming, eavesdropping, and flooding that disrupt WSN communications, affecting data integrity and availability. Each attack targets different OSI layers, with jamming impacting physical layers and flooding targeting transport layers.
How do bio-inspired algorithms address security challenges in WSNs?
Bio-inspired algorithms like Ant Colony Optimization (ACO) and artificial immune systems provide adaptive, decentralized solutions for routing and intrusion detection. These methods exploit biological principles, demonstrating robustness and scalability essential for securing wireless sensor networks.
What distinguishes bio-inspired approaches from conventional security methods?
Bio-inspired methods are decentralized and operate via parallel processing, increasing robustness compared to centralized conventional approaches. This adaptability allows them to cope with unforeseen security threats without human intervention.
Why is adaptability a crucial characteristic of bio-inspired security solutions?
Adaptability in bio-inspired solutions enables them to learn and respond to new environmental conditions, akin to biological systems. This characteristic is essential for maintaining secure operations in the dynamic and harsh environments typical of WSNs.
What roles do swarm intelligence and artificial immune systems play in WSN security?
Swarm intelligence facilitates self-organizing systems for efficient task allocation, while artificial immune systems excel at detecting deviations in network behavior. Both approaches showcase innovative mechanisms for enhancing the resilience of wireless sensor networks against various attacks.
References (27)
- Louazani Ahmed, Sekhri Larbi, and Kechar Bouabdel- lah. A security scheme against wormhole attack in mac layer for delay sensitive wireless sensor networks. Inter-national Journal of Information Technology and Com-puter Science (IJITCS), 6(12):1, 2014.
- Hari Ram Tanwar Akash Jeewan, Rashid Hussain. A survey on the issues of security challenges and solutions of attacks at different layers of wsn.
- Abdulaziz Rashid Alazemi. Defending wsns against jamming attacks. American Journal of Networks and Communications, 2(2):28-39, 2013.
- Nabil Ali Alrajeh, Mohamad Souheil Alabed, and Mo- hamed Shaaban Elwahiby. Secure ant-based routing protocol for wireless sensor network. International Jour-nal of Distributed Sensor Networks, 2013, 2013.
- Nitish Balachandran and Sugata Sanyal. A review of techniques to mitigate sybil attacks. arXiv preprint arXiv:1207.2617, 2012.
- Alejandro Canovas, Jaime Lloret, Elsa Macias, and Al- varo Suarez. Web spider defense technique in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 2014.
- Menaka Chandra, Ankit Naik, and Chayya Chandra. Study of wireless sensor networks security issues and attacks.
- Falko Dressler. Efficient and scalable communication in autonomous networking using bio-inspired mechanisms-an overview. Informatica, 29(2):183-8, 2005.
- Falko Dressler and Ozgur B Akan. Bio-inspired network-ing: from theory to practice. Communications Maga-zine, IEEE, 48(11):176-183, 2010.
- Mohamed Amine Ferrag and Mehdi Nafaa. An effective method of security against wormhole attack.
- Hongmei He, Zhenhuan Zhu, and Erkki Makinen. A neural network model to minimize the connected dominating set for self-configuration of wireless sen-sor networks. Neural Networks, IEEE Transactions on, 20(6):973-982, 2009.
- Sohail Jabbar, Rabia Iram, Abid Ali Minhas, Imran Shafi, Shehzad Khalid, and Muqeet Ahmad. Intelli-gent optimization of wireless sensor networks through bio- inspired computing: survey and future directions. International Journal of Distributed Sensor Networks, 2013, 2013.
- Jungwon Kim and Peter Bentley. The human im-mune system and network intrusion detection. In 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT'99), Aachen, Germany, pages 1244-1252. Citeseer, 1999.
- Michael Meisel, Vasileios Pappas, and Lixia Zhang. A taxonomy of biologically inspired research in computer networking. Computer Networks, 54(6):901-916, 2010.
- Aristides Mpitziopoulos and Damianos Gavalas. An ef-fective defensive node against jamming attacks in sen- sor networks. Security and Communication Networks, 2(2):145-163, 2009.
- Raju Neyyan, Ancy Paul, and Mayank Deshwal. Game theory based defence mechanism against flooding at-tack using puzzle. In IJCA Proceedings on International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012), number 2, pages 35-40. Foundation of Computer Science (FCS), 2012.
- ASK Pathan, Hyung-Woo Lee, and Choong Seon Hong. Security in wireless sensor networks: issues and chal- lenges. In Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, vol-ume 2, pages 6-pp. IEEE, 2006.
- M Pushpavalli and P Mahalakshmi. Comparison of leach protocol with wormhole attack and without worm- hole attack in wireless sensor networks.
- Heena Rathore, Venkataramana Badarla, Sushmita Jha, and Anupam Gupta. Novel approach for security in wireless sensor network using bio-inspirations. In COM-SNETS, pages 1-8, 2014.
- Heena Rathore and Sushmita Jha. Bio-inspired ma- chine learning based wireless sensor network security. In Nature and Biologically Inspired Computing (NaBIC), 2013
- World Congress on, pages 140-146. IEEE, 2013.
- Kashif Saleem, Norsheial Fisal, and Sharifah Hafizah. Biosarp: biological inspired self-organized secure au- tonomous routing protocol for wireless sensor network. In Proceedings of the 11th WSEAS international con-ference on Applied computer science, pages 158-165. World Scientific and Engineering Academy and Society (WSEAS), 2011.
- Jaime Lloret Sandra Sendra, 1 Lorena Parra and Shafi- ullah Khan. Review article systems and algorithms for wireless sensor networks based on animal and natural behavior. International Journal of Distributed Sensor Networks, 2015, 2015.
- Bhargavi Singh. Security mechanisms for selective for- warding attack in wireless sensor networks: Review and analysis.
- Virendra Pal Singh, Sweta Jain, and Jyoti Singhai. Hello flood attack and its countermeasures in wireless sensor networks. International journal of Computer Science issues, 7(11):23-27, 2010.
- Chanatip Tumrongwittayapak and Ruttikorn Varakul- siripunth. Detecting sinkhole attacks in wireless sen-sor networks. In ICCAS-SICE, 2009, pages 1966-1971. IEEE, 2009.
- Bing Wu, Jianmin Chen, Jie Wu, and Mihaela Cardei. A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless Network Security, pages 103-135. Springer, 2007.