Inspired Social Spider Behavior for Secure Wireless Sensor Networks

被引:5
|
作者
Benahmed, Khelifa [1 ,2 ]
Merabti, Madjid [1 ]
Haffaf, Hafid [2 ]
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool, Merseyside, England
[2] Univ Es Senia Oran, Oran, Algeria
关键词
Biologically Inspired Systems; Misbehavior Detection; Secure Wireless Sensor Networks; Security Attacks; Wireless Sensor Network;
D O I
10.4018/jmcmc.2012100101
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Last year's biologically inspired systems had received a great interest. Behavior of social insects, DNA computation, artificial neural networks, evolutionary computation, and artificial immune systems are some of the interests which can be highlighted. Wireless sensor networks have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. While wireless sensor networks, node misbehavior can cause the packet dropping, packet modification, packet misrouting, selfish node behavior, and so on. A biologically-inspired algorithm for detecting misbehaving nodes in a wireless sensor network is presented. Such an algorithm, inspired by the behavior of some social spiders from Congo, a specially their strategy to collaborate for detecting an intrusion in their web.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 50 条
  • [31] Secure localization algorithms for wireless sensor networks
    Boukerche, Azzedine
    Oliveira, Horacio A. B. F.
    Nakamura, Eduardo F.
    Loureiro, Antonio A. F.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 96 - 101
  • [32] Secure centralized localization for wireless sensor networks
    [J]. Zhang, T. (zhangting06@emails.bjut.edu.cn), 2012, Huazhong University of Science and Technology (40):
  • [33] Designing Secure Protocols for Wireless Sensor Networks
    Uluagac, A. Selcuk
    Lee, Christopher P.
    Beyah, Raheem A.
    Copeland, John A.
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 503 - +
  • [34] Secure Data Aggregation in Wireless Sensor Networks
    Ben Othman, Soufiene
    Trad, Abdelbasset
    Youssef, Habib
    Alzaid, Hani
    [J]. 2013 12TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET 2013), 2013, : 55 - 58
  • [35] Secure feedback service in wireless sensor networks
    Ma, Di
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 116 - 128
  • [36] A lightweight secure protocol for wireless sensor networks
    Sun, Bo
    Li, Chung-Chih
    Wu, Kui
    Xiao, Yang
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (13-14) : 2556 - 2568
  • [37] Secure Continuous Aggregation in Wireless Sensor Networks
    Yu, Lei
    Li, Jianzhong
    Cheng, Siyao
    Xiong, Shuguang
    Shen, Haiying
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (03) : 762 - 774
  • [38] Secure wireless sensor networks: Problems and solutions
    Hu, F
    Ziobro, J
    Tillett, J
    Sharma, NK
    [J]. CCCT 2003, VOL6, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: III, 2003, : 298 - 303
  • [39] Secure localization in wireless sensor networks: A survey
    Jiang, Jinfang
    Han, Guangjie
    Zhu, Chuan
    Dong, Yuhui
    Zhang, Na
    [J]. Journal of Communications, 2011, 6 (06): : 460 - 470
  • [40] Secure median computation in wireless sensor networks
    Roy, Sankardas
    Conti, Mauro
    Setia, Sanjeev
    Jajodia, Sushil
    [J]. AD HOC NETWORKS, 2009, 7 (08) : 1448 - 1462