Prediction of Sybil attack on WSN using Bayesian network and swarm intelligence

被引:4
|
作者
Muraleedharan, Rajani [1 ]
Ye, Xiang [1 ]
Osadciw, Lisa Ann [1 ]
机构
[1] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
来源
关键词
Bayesian network; denial of service; swarm intelligence; Sybil attack; wireless sensor networks;
D O I
10.1117/12.778219
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Security in wireless sensor networks is typically sacrificed or kept minimal due to limited resources such as memory and battery power. Hence, the sensor nodes are prone to Denial-of-service attacks and detecting the threats is crucial in any application. In this paper, the Sybil attack is analyzed and a novel prediction method, combining Bayesian algorithm and Swarm Intelligence (SI) is proposed. Bayesian Networks (BN) is used in representing and reasoning problems, by modeling the elements of uncertainty. The decision from the BN is applied to SI forming an Hybrid Intelligence Scheme (HIS) to re-route the information and disconnecting the malicious nodes in future routes. A performance comparison based on the prediction using HIS vs. Ant System (AS) helps in prioritizing applications where decisions are time-critical.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Retraction Note to: Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN
    Arthanareeswaran Angappan
    T. P. Saravanabava
    P. Sakthivel
    K. S. Vishvaksenan
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (Suppl 1) : 291 - 291
  • [22] A Network Clustering Algorithm for Sybil-Attack Resisting
    Xu, Ling
    Egawa, Ryusuke
    Takizawa, Hiroyuki
    Kobayashi, Hiroaki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (12): : 2345 - 2352
  • [23] Abductive Inference in Bayesian Belief Networks Using Swarm Intelligence
    Pillai, Karthik Ganesan
    Sheppard, John W.
    6TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS, AND THE 13TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS, 2012, : 375 - 380
  • [24] Parameter Estimation in Bayesian Networks Using Overlapping Swarm Intelligence
    Fortier, Nathan
    Sheppard, John
    Strasser, Shane
    GECCO'15: PROCEEDINGS OF THE 2015 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2015, : 9 - 16
  • [25] Curbing and Curing Sybil attack in Ad hoc Network
    Palanisamy, V.
    Annadurai, P.
    Vijilakshmi, S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 1 - +
  • [26] Sybil Attack Detection Scheme Based on Data Flow Monitoring and RSSI ranging in WSN
    Xu, Daiyu
    Wu, Yuanming
    Duan, Yingzhe
    2017 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS AND INFORMATION TECHNOLOGY (ICMIT 2017), 2017, : 110 - 114
  • [27] Swarm-based defense technique for tampering and cheating attack in WSN using CPHS
    Periyanayagi, S.
    Sumathy, V.
    PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (5-6) : 1165 - 1179
  • [28] Network attack prediction method based on threat intelligence for IoT
    Zhang, Hongbin
    Yi, Yuzi
    Wang, Junshe
    Cao, Ning
    Duan, Qiang
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (21) : 30257 - 30270
  • [29] Network attack prediction method based on threat intelligence for IoT
    Hongbin Zhang
    Yuzi Yi
    Junshe Wang
    Ning Cao
    Qiang Duan
    Multimedia Tools and Applications, 2019, 78 : 30257 - 30270
  • [30] Swarm-based defense technique for tampering and cheating attack in WSN using CPHS
    S. Periyanayagi
    V. Sumathy
    Personal and Ubiquitous Computing, 2018, 22 : 1165 - 1179