Bio-inspired, cross-layer protocol design for intrusion detection and identification in wireless sensor networks

Published studies have focused on the application of one bio-inspired or evolutionary computational method to the functions of a single protocol layer in a wireless ad hoc sensor network (WSN). In a novel departure from previous work, the cross-layer approach to WSN protocol design suggests applying a bio-inspired evolutionary computational method to the functions of each protocol layer to improve the intrusion detection identification (IDID) performance of a WSN cross-layer design beyond that of a single method assigned to only one layer's functions. A cross-layer design, embedding genetic algorithms, anti-phase synchronization, ant colony optimization, and a trust model based on quantized data reputation at the physical (PHY), medium access control (MAC), network, and application layers, respectively, is constructed. Simulation results demonstrate synergies among the bio-inspired methods of the proposed baseline design improve overall IDID performance of networks over that of a single computational method.

[1]  Lisa Ann Osadciw,et al.  Sensor Communication Networks Using Swarming Intelligence , 2003 .

[2]  William S. Hortos,et al.  Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks , 2007, SPIE Optics East.

[3]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[4]  William S. Hortos Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks , 2010, Defense + Commercial Sensing.

[5]  Masayuki Murata,et al.  Self-organizing Anti-phase Synchronization Scheme for Sensor Networks Inspired by Frogs ’ Calling Behavior , 2009 .

[6]  H Deng,et al.  ROUTING SECURITY IN AD HOC NETWORKS , 2002 .

[7]  Stefanos Gritzalis,et al.  Trust-Based Data Disclosure in Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[8]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[9]  Ganesh K. Venayagamoorthy,et al.  Computational Intelligence in Wireless Sensor Networks: A Survey , 2011, IEEE Communications Surveys & Tutorials.

[10]  William S. Hortos Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks , 2009, Defense + Commercial Sensing.

[11]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[12]  Alessandro Sorniotti,et al.  Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey , 2007 .

[13]  Lisa Ann Osadciw,et al.  Balancing the performance of a sensor network using an ant system , 2003 .