Inspired Social Spider Behavior for Secure Wireless Sensor Networks

被引:5
|
作者
Benahmed, Khelifa [1 ,2 ]
Merabti, Madjid [1 ]
Haffaf, Hafid [2 ]
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool, Merseyside, England
[2] Univ Es Senia Oran, Oran, Algeria
关键词
Biologically Inspired Systems; Misbehavior Detection; Secure Wireless Sensor Networks; Security Attacks; Wireless Sensor Network;
D O I
10.4018/jmcmc.2012100101
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Last year's biologically inspired systems had received a great interest. Behavior of social insects, DNA computation, artificial neural networks, evolutionary computation, and artificial immune systems are some of the interests which can be highlighted. Wireless sensor networks have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. While wireless sensor networks, node misbehavior can cause the packet dropping, packet modification, packet misrouting, selfish node behavior, and so on. A biologically-inspired algorithm for detecting misbehaving nodes in a wireless sensor network is presented. Such an algorithm, inspired by the behavior of some social spiders from Congo, a specially their strategy to collaborate for detecting an intrusion in their web.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 50 条
  • [21] Deterministic secure positioning in wireless sensor networks
    Delaet, Sylvie
    Mandal, Partha Sarathi
    Rokicki, Mariusz A.
    Tixeuil, Sebastien
    [J]. THEORETICAL COMPUTER SCIENCE, 2011, 412 (35) : 4471 - 4481
  • [22] Secure multiple deployment in wireless sensor networks
    Li, Guorui
    He, Jingsha
    Fu, Yingfang
    [J]. 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 389 - +
  • [23] Secure Fault Tolerance in Wireless Sensor Networks
    Yuan, Ting
    Zhang, Shiyong
    [J]. 8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 477 - 482
  • [24] A Secure Multicast Scheme for Wireless Sensor Networks
    Yu, Qian
    Zhang, Chang N.
    [J]. 2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC), 2012, : 158 - 163
  • [25] Secure Cooperative Routing in Wireless Sensor Networks
    Batool, Rida
    Bibi, Nargis
    Alhazmi, Samah
    Muhammad, Nazeer
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (12):
  • [26] A design for secure and survivable wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Tipper, David
    [J]. IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 30 - 37
  • [27] Secure wireless sensor networks: Problems and solutions
    Hu, F
    Ziobro, J
    Tillett, J
    Sharma, NK
    [J]. CCCT 2003, VOL6, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: III, 2003, : 298 - 303
  • [28] Secure Continuous Aggregation in Wireless Sensor Networks
    Yu, Lei
    Li, Jianzhong
    Cheng, Siyao
    Xiong, Shuguang
    Shen, Haiying
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (03) : 762 - 774
  • [29] A lightweight secure protocol for wireless sensor networks
    Sun, Bo
    Li, Chung-Chih
    Wu, Kui
    Xiao, Yang
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (13-14) : 2556 - 2568
  • [30] A Survey of Secure Routing in Wireless Sensor Networks
    LI Zhi-yuan1
    [J]. 南京邮电大学学报(自然科学版), 2010, 30 (01) : 77 - 87