Combined bio-inspired/evolutionary computational methods in cross-layer protocol optimization for wireless ad hoc sensor networks

Published studies have focused on the application of one bio-inspired or evolutionary computational method to the functions of a single protocol layer in a wireless ad hoc sensor network (WSN). For example, swarm intelligence in the form of ant colony optimization (ACO), has been repeatedly considered for the routing of data/information among nodes, a network-layer function, while genetic algorithms (GAs) have been used to select transmission frequencies and power levels, physical-layer functions. Similarly, artificial immune systems (AISs) as well as trust models of quantized data reputation have been invoked for detection of network intrusions that cause anomalies in data and information; these act on the application and presentation layers. Most recently, a self-organizing scheduling scheme inspired by frog-calling behavior for reliable data transmission in wireless sensor networks, termed anti-phase synchronization, has been applied to realize collision-free transmissions between neighboring nodes, a function of the MAC layer. In a novel departure from previous work, the cross-layer approach to WSN protocol design suggests applying more than one evolutionary computational method to the functions of the appropriate layers to improve the QoS performance of the cross-layer design beyond that of one method applied to a single layer's functions. A baseline WSN protocol design, embedding GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layers, respectively, is constructed. Simulation results demonstrate the synergies among the bioinspired/ evolutionary methods of the proposed baseline design improve the overall QoS performance of networks over that of a single computational method.

[1]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[2]  Alessandro Sorniotti,et al.  Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey , 2007 .

[3]  Paramvir Bahl,et al.  Distributed Topology Control for Wireless Multihop Ad-hoc Networks , 2001, INFOCOM.

[4]  H Deng,et al.  ROUTING SECURITY IN AD HOC NETWORKS , 2002 .

[5]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[6]  William S. Hortos Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks , 2009, Defense + Commercial Sensing.

[7]  William S. Hortos Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks , 2010, Defense + Commercial Sensing.

[8]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[9]  Lisa Ann Osadciw,et al.  Balancing the performance of a sensor network using an ant system , 2003 .

[10]  Ganesh K. Venayagamoorthy,et al.  Computational Intelligence in Wireless Sensor Networks: A Survey , 2011, IEEE Communications Surveys & Tutorials.

[11]  Stefanos Gritzalis,et al.  Trust-Based Data Disclosure in Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[12]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[13]  Qun Li,et al.  Three power-aware routing algorithms for sensor networks , 2003, Wirel. Commun. Mob. Comput..

[14]  Lisa Ann Osadciw,et al.  Sensor Communication Networks Using Swarming Intelligence , 2003 .

[15]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[16]  Lisa Ann Osadciw,et al.  Robustness of predictive sensor network routing in fading channels , 2005, SPIE Defense + Commercial Sensing.

[17]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[18]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[19]  Masayuki Murata,et al.  Self-organizing Anti-phase Synchronization Scheme for Sensor Networks Inspired by Frogs ’ Calling Behavior , 2009 .

[20]  William S. Hortos,et al.  Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks , 2007, SPIE Optics East.