Academia.eduAcademia.edu

Outline

A Bio-Inspired Secure Routing Protocol for WSNs

2008

Abstract

The field of wireless sensor network (WSN) is an important and challenging research area today. Advancements in sensor networks enable a wide range of environmental monitoring and object tracking applications. Secure routing in sensor networks is a difficult problem due to the resources limitations in WSN. Moreover, multihop routing in WSN is affected by new nodes constantly entering/leaving the system. Therefore, biologically inspired algorithms are reviewed and enhanced to tackle problems arise in WSN. Ant routing and human security has shown an excellent performance for sensor networks. Certain parameters like energy level, link quality, lose rate are considered while making decisions. These decisions will come up with the optimal route and also to take best action against the security attacks. In this paper, the design and initial work on biological-inspired self-organized secure autonomous routing algorithm for sensor networks are presented. The proposed bio-inspired algorithm will also meet the enhanced sensor network requirements, including energy consumption, success rate and time delay.

FAQs

sparkles

AI

What mechanisms does BIOSARP employ for secure routing in WSNs?add

BIOSARP utilizes a combination of ANT Colony Optimization (ACO) for routing and Artificial Immune System (AIS) principles for self-healing security. This dual approach addresses both routing efficiency and network security in resource-constrained environments.

How does BIOSARP improve energy efficiency compared to existing protocols?add

The proposed BIOSARP minimizes initial broadcasting time through a novel routing optimization strategy, thus enhancing battery life in sensor networks. It leverages the remaining power parameter to distribute routing loads effectively among nodes.

What are the main security vulnerabilities addressed by BIOSARP?add

BIOSARP targets prevalent WSN attacks such as signal jamming, spoofing, and selective forwarding, incorporating metrics like link quality and energy consumption for security decisions. This comprehensive framework aims to autonomously detect and mitigate these threats.

What metrics are essential for routing decisions in BIOSARP?add

Key metrics for routing decisions in BIOSARP include velocity, Packet Reception Rate (PRR), and remaining power. These factors help optimize node selection and enhance overall routing effectiveness.

How does BIOSARP compare with traditional ant-based routing algorithms?add

BIOSARP integrates novel metrics for selecting forwarding nodes, contrasting with traditional ACO approaches that primarily rely on energy or delay alone. This innovation results in improved link quality management and reduced packet loss.

References (24)

  1. S. Balasubramaniam, D. Botvich, W. Donnelly, M. Foghluh, and J. Strassner, "Biologically Inspired Self-Governance and Self-Organisation for Autonomic Networks," in IEEE, 2006.
  2. S. Balasubramaniam, W. Donnelly, D. Botvich, N. Agoulmine, and J. Strassner, "Towards integrating principles of Molecular Biology for Autonomic Network Management," in Hewlett Packard university Association (HPOVUA) conference, Nice, France., 2006.
  3. P. Boonma and J. Suzuki, "MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks," in In Proc. of the 41st Hawaii International Conference on System Sciences (HICSS) Big Island, HI, 2008.
  4. N. Mazhar and M. Farooq, "BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc," Springer- Verlag Berlin Heidelberg, vol. LNCS 4628, pp. 370-381, 2007. Knowledge base on Sink node/Laptop
  5. G. Chen, T.-D. Guo, W.-G. Yang, and T. Zhao, "An improved ant-based routing protocol in Wireless Sensor Networks," in Collaborative Computing: International Conference on Networking, Applications and Worksharing, 2006. CollaborateCom 2006., Nov. 2006, pp. 1-7.
  6. Y. Zhang, L. D. Kuhn, and M. P. J. Fromherz, "Improvements on Ant Routing for Sensor Networks," M. Dorigo et al. (Eds.): ANTS 2004, Springer-Verlag Berlin Heidelberg 2004, vol. LNCS 3172, pp. 154-165, 2004.
  7. Y. Lu, G. Zhao, and F. Su, "Adaptive Ant-based Dynamic Routing Algorithm," in In Proceedings of the 5th World Congress on Intelligent Control and Automation, Hangzhuo, China, June 2004, pp. 2694-2697.
  8. R. G. Aghaei, M. A. Rahman, W. Gueaieb, and A. E. Saddik, "Ant Colony-Based Reinforcement Learning Algorithm for Routing in Wireless Sensor Networks," in Instrumentation and Measurement Technology Conference -IMTC Warsaw, Poland: IEEE, 2007.
  9. Y.-f. WEN, Y.-q. CHEN, and M. PAN, "Adaptive ant-based routing in wireless sensor networks using Energy*Delay metrics," Journal of Zhejiang University SCIENCE Avol. 9, pp. 531-538, 2008.
  10. C. Lee and J. Suzuki, "Autonomic Network Applications Designed after Immunological Self-Regulatory Adaptation," IEEE, 2007.
  11. D. Karaboga, "Routing in Wireless Sensor Networks Using Ant Colony Optimization" in Proceedings of the First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06), 2006.
  12. L. A. L. A. Ali, M.A. Sarijari, N. Fisal, "Real-time Routing in Wireless Sensor Networks," in The 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 2008.
  13. J. Zhao and R. Govindan, "Understanding Packet Delivery Performance in Dense Wireless Sensor Networks," in Proceedings of the 1st international conference on Embedded networked sensor systems, USA, 2003.
  14. A. K. Pathan, H. W. Lee, and C. S. Hong, "Security in Wireless Sensor Networks: Issues and Challenges," in Proceedings of 8th IEEE ICACT 2006, Phoenix Park, Korea, 2006, pp. 1043-1048.
  15. J. Ma, S. Zhang, Y. Zhong, and X. Tong, "SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks," LNCS 4298 pp. 60-73, 2007.
  16. C. H. Lim, "LEAP++: A Robust Key Establishment Scheme forWireless Sensor Networks," in The 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 2008.
  17. H. Wang, B. Sheng, C. C. Tan, and Q. Li, "Comparing Symmetric-key and Public-key based Security Schemes in Sensor Networks: A Case Study of User Access Control," in The 28th International Conference on Distributed Computing Systems, Beijing, China, 2008.
  18. A. Ali and N. Fisal, "Security enhancement for real-time routing protocol in wireless sensor networks," in 5th IFIP International Conference on Wireless and Optical Communications Networks. WOCN '08., 2008, pp. 1-5.
  19. C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Elsevier's Ad Hoc Network Journal, pp. 293-315, September 2003 2003.
  20. X. Du, Y. Xiao, H.-H. Chen, and Q. Wu, "Secure cell relay routing protocol for sensor networks," Wireless Communications and Mobile Computing, Special Issue: Wireless Network Security, John Wiley & Sons, Ltd., vol. 6, pp. 375 -391, 2008.
  21. G. Li, J. He, and Y. Fu, "A Distributed Intrusion Detection Scheme for Wireless Sensor Networks," in The 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 2008, pp. 1545-0678/08.
  22. K. Xing and F. Liu, "Real-time Detection of Clone Attacks in Wireless Sensor Networks," in The 28th International Conference on Distributed Computing Systems, Beijing, China, 2008.
  23. Processing Agents
  24. Monitoring (Forwarding Ant)