Inspired Social Spider Behavior for Secure Wireless Sensor Networks

被引:5
|
作者
Benahmed, Khelifa [1 ,2 ]
Merabti, Madjid [1 ]
Haffaf, Hafid [2 ]
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool, Merseyside, England
[2] Univ Es Senia Oran, Oran, Algeria
关键词
Biologically Inspired Systems; Misbehavior Detection; Secure Wireless Sensor Networks; Security Attacks; Wireless Sensor Network;
D O I
10.4018/jmcmc.2012100101
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Last year's biologically inspired systems had received a great interest. Behavior of social insects, DNA computation, artificial neural networks, evolutionary computation, and artificial immune systems are some of the interests which can be highlighted. Wireless sensor networks have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. While wireless sensor networks, node misbehavior can cause the packet dropping, packet modification, packet misrouting, selfish node behavior, and so on. A biologically-inspired algorithm for detecting misbehaving nodes in a wireless sensor network is presented. Such an algorithm, inspired by the behavior of some social spiders from Congo, a specially their strategy to collaborate for detecting an intrusion in their web.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 50 条
  • [1] Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks
    Gabrielli, Andrea
    Mancini, Luigi V.
    [J]. BIO-INSPIRED COMPUTING AND COMMUNICATION, 2008, 5151 : 399 - 410
  • [2] Sensor Deployment Scheme Based on Social Spider Optimization Algorithm for Wireless Sensor Networks
    Zhou, Yongquan
    Zhao, Ruxin
    Luo, Qifang
    Wen, Chunming
    [J]. NEURAL PROCESSING LETTERS, 2018, 48 (01) : 71 - 94
  • [3] Sensor Deployment Scheme Based on Social Spider Optimization Algorithm for Wireless Sensor Networks
    Yongquan Zhou
    Ruxin Zhao
    Qifang Luo
    Chunming Wen
    [J]. Neural Processing Letters, 2018, 48 : 71 - 94
  • [4] Feedback: Towards dynamic behavior and secure routing for wireless sensor networks
    Cao, Zhen
    Hu, Jianbin
    Chen, Zhong
    Xu, Maoxing
    Zhou, Xia
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 160 - +
  • [5] Secure Broadcast in Wireless Sensor Networks
    Yu, Qian
    Zhang, Chang N.
    [J]. 2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 424 - 429
  • [6] Secure diffusion for wireless sensor networks
    Yang, Hao
    Wong, Starsky H. Y.
    Lu, Songwu
    Zhang, Lixia
    [J]. 2006 3RD INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS AND SYSTEMS, VOLS 1-3, 2006, : 977 - +
  • [7] Secure localization in wireless sensor networks
    Zhang, Yanchao
    Liu, Wei
    Fang, Yuguang
    [J]. MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 3169 - 3175
  • [8] Secure Multicasting for Wireless Sensor Networks
    Mani, Dona Maria
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (11): : 70 - 75
  • [9] Secure and Efficient Wireless Sensor Networks
    Schmitt, Corinna
    Stiller, Burkhard
    [J]. ERCIM NEWS, 2015, (101): : 18 - 19
  • [10] Framework for Secure Wireless Communication in Wireless Sensor Networks
    Usama, Muhammad
    Bin Muhaya, Fahad T.
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,