Sensitive Ants for Denial Jamming Attack on Wireless Sensor Network

The Quality of Service in security networks systems is constantly improved. The current paper propose a newly defense mechanism, based on ant system, for different jamming attack on Wireless Sensor Network (WSN). The sensitive ants react on attacks based on several reliable parameters including their level of sensitivity. The information in network is re-directed from the attacked node to its appropriate destination node. The paper analyzes how are detected and isolated the jamming attacks using mobile agents, ant systems in general and with the newly ant-based sensitive approach in particular.

[1]  David L. Adamy,et al.  EW 102: A Second Course in Electronic Warfare , 2004 .

[2]  Barbara Messing,et al.  An Introduction to MultiAgent Systems , 2002, Künstliche Intell..

[3]  Marco Dorigo,et al.  Ant system: optimization by a colony of cooperating agents , 1996, IEEE Trans. Syst. Man Cybern. Part B.

[4]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[5]  Ahmed Karmouch,et al.  Mobile software agents: an overview , 1998, IEEE Commun. Mag..

[6]  I. Rechenberg Artificial evolution and artificial intelligence , 1988 .

[7]  Daniel Karapetyan,et al.  An Efficient Hybrid Ant Colony System for the Generalized Traveling Salesman Problem , 2012, Algorithmic Oper. Res..

[8]  Valentina Emilia Balas,et al.  From Cognitive Binary Logic to Cognitive Intelligent Agents , 2010, 2010 IEEE 14th International Conference on Intelligent Engineering Systems.

[9]  Camelia-Mihaela Pintea Combinatorial optimization with bio-inspired computing , 2008 .

[10]  Hak-Man Kim,et al.  Traffic Rerouting Strategy against Jamming Attacks in WSNs for Microgrid , 2012, Int. J. Distributed Sens. Networks.

[11]  Lisa Ann Osadciw,et al.  Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.

[12]  Elena Nechita,et al.  Solving Fuzzy TSP with Ant Algorithms , 2008 .

[13]  Issa M. Khalil MPC: Mitigating Stealthy Power Control Attacks in Wireless Ad Hoc Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[14]  Ruxandra Stoean,et al.  Evolution of Cooperating Classification Rules with an Archiving Strategy to Underpin Collaboration , 2009 .

[15]  Issa M. Khalil,et al.  DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[16]  Petrica C. Pop,et al.  A Sensitive Metaheuristic for Solving a Large Optimization Problem , 2008, SOFSEM.

[17]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[18]  Luca Maria Gambardella,et al.  Ant colony system: a cooperative learning approach to the traveling salesman problem , 1997, IEEE Trans. Evol. Comput..

[19]  Petrica C. Pop,et al.  Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model , 2012, CISIS/ICEUTE/SOCO Special Sessions.

[20]  Barna Iantovics,et al.  Intelligent Complex Evolutionary Agent‐Based Systems , 2009 .

[21]  Camelia-Mihaela Pintea,et al.  Sensitive Stigmergic Agent Systems - A Hybrid Approach to Combinatorial Optimization , 2008, Innovations in Hybrid Intelligent Systems.

[22]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[23]  Camelia-Mihaela Pintea,et al.  Sensitive Ants: Inducing Diversity in the Colony , 2008, NICSO.

[24]  Charalampos Konstantopoulos,et al.  JAID: An algorithm for data fusion and jamming avoidance on distributed sensor networks , 2009, Pervasive Mob. Comput..

[25]  Alice E. Smith,et al.  An ant system approach to redundancy allocation , 1999, Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406).

[26]  D. Dumitrescu,et al.  SENSITIVE ANT SYSTEMS IN COMBINATORIAL OPTIMIZATION , 2007 .