Mobile Agent Based Enhanced Security for Wireless Sensor Networks

Wireless sensor networks (WSNs) have attracted a lot of researchers due to their high potential in critical applications. WSNs are currently being employed in a variety of applications ranging from medical to military, and from home to industry. WSNs have unique constraints as compared to traditional networks making the implementation of existing security measures not practicable. These constraints are the result of limitations regarding the sensor nodes' memory, energy and transmission and processing power. So, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Thus, design and implementation of secure WSNs is challenging task. Recently mobile agents have been proved as an enabled technology for programming WSN. This research work fundamentally focuses on producing a combined security solution which uses mobile agents. The proposed security solution using mobile agents is to provide basic security services and to defend against seven attacks such as Denial of Service attack, Hello flooding attack, Traffic analysis, Cloning attack, Sink hole attack, Black hole attack and Selective forwarding attack with the energy overhead of addressing a single attack.

[1]  G. Fortino,et al.  Using Mobile Agents as Enabling Technology for Wireless Sensor Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).

[2]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[3]  Narayan C. Debnath,et al.  Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.

[4]  Matthias Hollick,et al.  Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives , 2010, Future Internet.

[5]  Muhammad Usman,et al.  Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks , 2012 .

[6]  Satyajayant Misra,et al.  BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[7]  Orhan Dagdeviren,et al.  A Survey of Agent Technologies for Wireless Sensor Networks , 2011 .

[8]  I. Vukasinovic,et al.  A survey on the use of Mobile Agents in Wireless Sensor Networks , 2012, 2012 IEEE International Conference on Industrial Technology.

[9]  B.B. Amberker,et al.  Agent Based Secure Data Collection in Heterogeneous Sensor Networks , 2010, 2010 Second International Conference on Machine Learning and Computing.

[10]  R. B. Patel,et al.  MASLKE: Mobile Agent Based Secure Location aware Key Establishment in sensor networks , 2008, 2008 16th IEEE International Conference on Networks.

[11]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[12]  Liviu Iftode,et al.  Smart Messages: A Distributed Computing Platform for Networks of Embedded Systems , 2004, Comput. J..

[13]  Xin-Wen Wu,et al.  Securing mobile agent based Wireless Sensor Network applications on middleware , 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT).

[14]  Bai Li,et al.  Using Mobile Agents to Detect and Recover from Node Compromise in Path-based DoS Attacks in Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[15]  Chenyang Lu,et al.  Agilla: A mobile agent middleware for self-adaptive wireless sensor networks , 2009, TAAS.

[16]  M. Ketel Applying the Mobile Agent Paradigm to Distributed Intrusion Detection in Wireless Sensor networks , 2008, 2008 40th Southeastern Symposium on System Theory (SSST).

[17]  Jiannong Cao,et al.  Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.

[18]  Fortunato Santucci,et al.  Agent-based scalable design of a cross-layer security framework for Wireless Sensor Networks Monitoring Applications , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.