Detecting Sybil attacks in image senor network using cognitive intelligence

Wireless Sensor Network has become state-of-art technology of the 21st century, the application ranges from academic to military operations. These tiny sensors can be deployed in open environment, where security to neither data nor hardware can be guaranteed. Unfortunately, due to the resource constraints traditional security schemes cannot be applied directly, therefore designing protocols that can operate securely using smart inherent features is the only viable option. In this paper, Sybil, a denial of service attack on Image Sensor Network is analyzed and the characteristic of the cognitive protocol against this attack is evaluated based on the network's reliability and quality of service.

[1]  Ravi Kothari,et al.  Fractional-Step Dimensionality Reduction , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[2]  Brian C. Lovell,et al.  Person Location Service on the Planetary Sensor Network , 2005 .

[3]  Hua Yu,et al.  A direct LDA algorithm for high-dimensional data - with application to face recognition , 2001, Pattern Recognit..

[4]  Lisa Ann Osadciw,et al.  Security: Cross Layer Protocol in Wireless Sensor Network , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[5]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[6]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[7]  Hairong Qi,et al.  Revisiting Public-Key Cryptography for Wireless Sensor Networks , 2005, Computer.

[8]  Dawu Gu,et al.  Scalable PKI model based on location information , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..

[9]  Karsten P. Ulland,et al.  Vii. References , 2022 .

[10]  Lisa Ann Osadciw,et al.  Contourlet Based Image Recovery and De-noising Through Wireless Fading Channels , 2005 .

[11]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[12]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[13]  Mauro Birattari,et al.  Swarm Intelligence , 2012, Lecture Notes in Computer Science.

[14]  Ja-Chen Lin,et al.  A new LDA-based face recognition system which can solve the small sample size problem , 1998, Pattern Recognit..

[15]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[16]  Lisa Ann Osadciw,et al.  Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.

[17]  R. Muraleedharan,et al.  Cross Layer Denial of Service Attacks in Wireless Sensor Network Using Swarm Intelligence , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[18]  H. Hotelling Analysis of a complex of statistical variables into principal components. , 1933 .

[19]  Lisa Ann Osadciw,et al.  Decision Making In a Building Access System Using Swarm Intelligence & POSETS , 2004 .

[20]  Konstantinos N. Plataniotis,et al.  Face recognition using LDA-based algorithms , 2003, IEEE Trans. Neural Networks.