Biological inspired autonomously secure mechanism for wireless sensor networks

Wireless communication plays an important role in these days in the sector of telecommunication and has huge importance for future research. There has been an exponential growth in wireless communication due to the development of different devices and applications. In addition, there is an explosive increase in integration and convergence of different heterogonous wireless networks to ensure effective and efficient communication. These technologies primarily includes Wireless Wide Area Networks (WWANs), Wireless Local Area Networks (WLANs), Wireless Personal Area Net-works (WPANs), and the Internet. The cellular networks can be classified under the WWAN, Blue-tooth, and Ultrawide Bands classified as WPANs, and finally the WLANs and High-Performance Radio Local Area Networks (HiperLANs) belongs to the WLAN class.

[1]  Bo Sheng,et al.  Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[2]  Falko Dressler,et al.  Benefits of Bio-inspired Technologies for Networked Embedded Systems: An Overview , 2006, Organic Computing - Controlled Emergence.

[3]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[4]  Rayford B. Vaughn,et al.  Intrusion sensor data fusion in an intelligent intrusion detection system architecture , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[5]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[6]  Tolga Coplu,et al.  SENDROM: Sensor networks for disaster relief operations management , 2007, Wirel. Networks.

[7]  Thomas Stützle,et al.  A short convergence proof for a class of ant colony optimization algorithms , 2002, IEEE Trans. Evol. Comput..

[8]  Tiande Guo,et al.  An improved ant-based routing protocol in Wireless Sensor Networks , 2006 .

[9]  Yk Kwok Sensor Networks and Multi-hop Communications,” The Second IEEE International Workshop on Wireless Mesh and Ad Hoc Networks (WiMAN 2008), in conjunction with the 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China , 2008 .

[10]  Secure cell relay routing protocol for sensor networks: Research Articles , 2006 .

[11]  Chang-Gun Lee,et al.  Probabilistic QoS guarantee in reliability and timeliness domains in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[12]  Sajal K. Das,et al.  A game theory based approach for security in wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[13]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[14]  Yoonmee Doh,et al.  PLUS: parameterised localised trust management-based security framework for sensor networks , 2008, Int. J. Sens. Networks.

[15]  Kashif Saleem,et al.  Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.

[16]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[17]  Junichi Suzuki,et al.  Autonomic Network Applications Designed after Immunological Self-Regulatory Adaptation , 2007, 2007 International Conference on Integration of Knowledge Intensive Multi-Agent Systems.

[18]  Yong Lu,et al.  Adaptive ant-based dynamic routing algorithm , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).

[19]  Jianqing Ma,et al.  SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks , 2006, WISA.

[20]  Thomas Stützle,et al.  A SHORT CONVERGENCE PROOF FOR A CLASS OF ACO ALGORITHMS , 2002 .

[21]  Emma Hart,et al.  Evaluation and Extension of the AISEC Email Classification System , 2008, ICARIS.

[22]  Suat Ozdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .

[23]  Per Johansson,et al.  Wireless ad hoc networking—The art of networking without a network , 2000 .

[24]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[25]  Victor C. M. Leung,et al.  Directional geographical routing for real-time video communications in wireless sensor networks , 2007, Comput. Commun..

[26]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[27]  Rogério de Lemos,et al.  Immune-Inspired Adaptable Error Detection for Automated Teller Machines , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[28]  Ying Zhang,et al.  Improvements on Ant Routing for Sensor Networks , 2004, ANTS Workshop.

[29]  Min Pan,et al.  Adaptive ant-based routing in wireless sensor networks using Energy*Delay metrics , 2008 .

[30]  Junichi Suzuki,et al.  MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[31]  Huanguo Zhang,et al.  A formal reputation system for trusting wireless sensor network , 2008, Wuhan University Journal of Natural Sciences.

[32]  Chae Hoon Lim LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[33]  T. Basar,et al.  A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[34]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[35]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[36]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[37]  Deborah Estrin,et al.  Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.

[38]  Deborah Estrin,et al.  Statistical model of lossy links in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[39]  Azzedine Boukerche,et al.  A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..

[40]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[41]  Tohru Kikuno,et al.  A routing protocol for finding two node-disjoint paths in computer networks , 1995, Proceedings of International Conference on Network Protocols.

[42]  Martin Middendorf,et al.  Design Aspects of Multi-level Reconfigurable Architectures , 2008, J. Signal Process. Syst..

[43]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[44]  Theme Feature Toward Systematic Design of Fault- Tolerant Systems , 1997 .

[45]  Selcuk Okdem,et al.  Routing in Wireless Sensor Networks Using Ant Colony Optimization , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).

[46]  Luca Maria Gambardella,et al.  AntHocNet: an adaptive nature-inspired algorithm for routing in mobile ad hoc networks , 2005, Eur. Trans. Telecommun..

[47]  Ajith Abraham,et al.  IDEAS: intrusion detection based on emotional ants for sensors , 2005, 5th International Conference on Intelligent Systems Design and Applications (ISDA'05).

[48]  Jingsha He,et al.  A Distributed Intrusion Detection Scheme for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[49]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[50]  John Strassner,et al.  Biologically Inspired Self-Governance and Self-Organisation for Autonomic Networks , 2006, 2006 1st Bio-Inspired Models of Network, Information and Computing Systems.

[51]  Ramesh Govindan,et al.  Understanding packet delivery performance in dense wireless sensor networks , 2003, SenSys '03.

[52]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .

[53]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[54]  Kashif Saleem,et al.  Ant based Self-organized Routing Protocol for Wireless Sensor Networks , 2009, Int. J. Commun. Networks Inf. Secur..

[55]  Alex Alves Freitas,et al.  AISEC: an artificial immune system for e-mail classification , 2003, IEEE Congress on Evolutionary Computation.

[56]  S. Banerjee,et al.  Intrusion Detection on Sensor Networks Using Emotional Ants , 2005 .

[57]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[58]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[59]  Junichi Suzuki,et al.  SWAT: A Decentralized Self-Healing Mechanism for Wormhole Attacks in Wireless Sensor Networks , 2010 .

[60]  A. El Saddik,et al.  Ant Colony-Based Reinforcement Learning Algorithm for Routing in Wireless Sensor Networks , 2007, 2007 IEEE Instrumentation & Measurement Technology Conference IMTC 2007.

[61]  Hui-Hua Yang,et al.  Ant colony optimization based network intrusion feature selection and detection , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[62]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.

[63]  Muddassar Farooq,et al.  BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc , 2007, ICARIS.

[64]  Nazim Agoulmine,et al.  Towards Integrating Principles of Molecular Biology for Autonomic Network Management , 2006 .

[65]  Selcuk Okdem,et al.  Routing in Wireless Sensor Networks Using an Ant Colony Optimization (ACO) Router Chip , 2009, Sensors.

[66]  Fang Liu,et al.  Real-Time Detection of Clone Attacks in Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[67]  Benjamín Barán,et al.  A new approach for AntNet routing , 2000, Proceedings Ninth International Conference on Computer Communications and Networks (Cat.No.00EX440).

[68]  Norsheila Fisal,et al.  A real-time routing protocol with load distribution in wireless sensor networks , 2008, Comput. Commun..

[69]  Yau-Hwang Kuo,et al.  The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[70]  Gurdip Singh,et al.  Ant Colony Algorithms for Steiner Trees: An Application to Routing in Sensor Networks , 2005 .

[71]  Norsheila Fisal,et al.  Real-Time Routing in Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[72]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[73]  N. Fisal,et al.  Security enhancement for real-time routing protocol in wireless sensor networks , 2008, 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08).

[74]  Claudia Keser,et al.  Experimental games for the design of reputation management systems , 2003, IBM Syst. J..

[75]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[76]  Aleksandar Milenkovic,et al.  Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..