SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 449
A SURVEY ON BIO-INSPIRED SECURITY IN WIRELESS SENSOR
NETWORKS
S R Mani Sekhar1
, Abhijith S2
, Bellamkonda Maruthi3
, Bharath Kumar4
, Chetan Janiwarad5
1
M S Ramiah Institute of Technology, Bangalore
2
M S Ramiah Institute of Technology, Bangalore
3
M S Ramiah Institute of Technology, Bangalore
4
M S Ramiah Institute of Technology, Bangalore
5
M S Ramiah Institute of Technology, Bangalore
Abstract
Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not
physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and
critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and
many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us
valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components
react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to
evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird
flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper,
we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the
proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired
approach.
Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
--------------------------------------------------------------------***------------------------------------------------------------------
1. INTRODUCTION
Wireless sensor networks are gaining significance in the
mod- ern day world because of their wide range of potential
appli- cations in the fields of science, industry,
transportation, civil infrastructure, and military.
Communication over wireless medium is, by nature not
secure and is vulnerable to vari- ous threats and attacks. Due
to deployment of the nodes in physically hostile and harsh
environments, multi hop and distributed architecture, WSN
is more susceptible to dif- ferent types of security attacks
and threats. It is easy for an attacker to launch security
attacks against physical, me- dia access, or network layer in
the WSN. Therefore some sort of security mechanism is
highly advisable. Establishing any efficient security scheme
in wireless sensor networks is made challenging by the
sensors size, processing or comput- ing power of each
sensor node, memory and type of tasks expected to be
performed by the sensors.
In networks, security is a broad term that comprises of
varied parameters like authentication, integrity, privacy, and
non-repudiation [17]. A security framework in order to be
agreed upon, should not violate these requirements. Al-
though research in the field of sensor networks security is
progressing positively, it still lacks a comprehensive inte-
grated framework which can provide security to each layer
and services of sensor networks. Inspired by the implicit al-
luring characteristics of biological systems, many
researchers are working to produce new novel design
paradigms to ad- dress challenges in current network
systems[14].
Fig 1: Nodes in WSN[7]
Adaptabil- ity, scalability, robustness are a few of many
advantages that a bio-inspired approach provides. Biological
techniques usu- ally are results of efforts of generations for
their struggle to survive harsh conditions. Bio-inspired
algorithms are built on simple rules and are usually not
complex. Attacks in WSNs can be analysed from two
different views. Attacks against the mechanisms which
provide security (security at- tacks) to the network and
attacks against basic mechanisms like routing and other
physical attacks. The different types of attacks that a
network can come up against are jamming, tampering, node
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 450
capture, dos attack (physical layer), col- lision (link layer),
Sybil attack, wormhole, sinkhole attack, selective
forwarding (network layer) and flooding (transport layer).
These attacks can be negated by using security mech-
anisms like effective key management, cryptography, secure
broadcasting and multicasting, Intrusion detection System
(IDS). The biological algorithms: ant colony optimization
(ACO) is used for secure routing, spider defence
mechanism, human immune system [22] are used as
templates to react to the security attacks. The rest of the
paper is arranged as follows. Summary of the different types
of attacks in a wire- less sensor network is given in section
2. Section 3 discusses the bio inspired algorithms studied so
far. In continuation to this, in Section 5 a comparison is
made between conven- tional and bio-inspired approaches to
securing wsns against attacks. Conclusion is given in the last
section.
2. TYPES OF ATTACKS IN WSN
Here, we look at some of the attacks (discussed in the ref-
erences) that tend to disrupt communications over wireless
networks, and categorize these attacks based on their effects
on data integrity and confidentiality, routing, identity, power
consumption, privacy, and service availability and
bandwidth related attacks[15].
2.1 Data Integrity and Confidentiality
2.1.1 Node Capture Attack
In Node Capture Attack, the attacker captures the sensor
nodes physically and thus those nodes are compromised and
the data accumulated in the nodes can be manipulated.
2.1.2 Eavesdropping Attack
In Eavesdropping attack or network sniffing, as the name
suggests information is retrieved from a network by
snooping on data being transmitted. The attacker is
clandestinely able to overhear a private conversation in an
illegitimate way.
2.1.3 Denial of Service (DoS) Attack
This attack is an attempt to make a network unavailable for
its authorized users. This type attack is implemented by
consuming the networks resources such as power supply,
memory so that it can no longer provide its intended service.
A DoS attack generally targets physical layer applications in
an environment where sensor nodes are located. Jamming,
Flooding and selective forwarding attacks discussed later are
variations of DoS attack.
2.2 Power Consumption Related Attacks
2.2.1 Sleep Deprivation Torture Attack
This type of attack targets the link layer. The attackers target
is to minimize the lifetime of the sensor nodes by in-
creasing power consumption. This can be implemented by
keeping the sensor nodes busy at all times depriving it of
any sleep time or rest.
2.2.2 Collision Attack
In collision attack, the attacker tries to manipulate the octet
configuration of transmitted packets simulating a collision.
When this happens then, the packets will be discarded due to
checksum mismatch.
2.3 Service Availability and Bandwidth
Consumption Related Attacks
2.3.1 Flooding Attack
In this type of attack, the attacker normally sends a sub-
stantial number of packets to the target node or to an access
point to prevent it from establishing or continuing a commu-
nication path.
2.3.2 Jamming Attack
This is a standard attack on a wireless sensor network,
where a node or set of nodes are simply jammed.
2.3.3 Selective Forwarding Attack
This attack is also known as Gray Hole attack. Here,
selected packets are dropped by a forwarding node other
unrelated or obsolete packets are forwarded instead. The
fraudulent node might also forward the message to the
wrong path, creating inconsistent routing information in the
network.
2.4 Routing Related Attacks
2.4.1 Wormhole Attack
In a wormhole attack or tunnel attack, an intruder manip-
ulates packets at one point in the network, tunnels them to
another point in the network, and then replays them into the
network[26]. An attacker infringes communications from
the sender, changes a portion or a whole packet, and speeds
up sending the changed packet through a specific wormhole
tun- nel in such a way that the altered packet arrives at the
des- tination before the original packet which traverses
through the usual routes.
2.4.2 Sinkhole Attack
The sinkhole attack is a severe attack that prevents the base
station from obtaining complete and correct data, thus forms
a serious threat to higher-layer applications. In a Sinkhole
attack, a compromised node tries to draw all or as much
traffic as possible from a particular area.
2.4.3 Hello Flood Attack
The routing paths are burdened (flooded) with hello or ACK
messages
2.5 Identity Related Attacks
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 451
2.5.1 Impersonation Attack
An attacker impersonates another nodes identity copying the
nodes MAC or IP address to enter the network or to launch
other attacks on the node.
2.5.2 Sybil Attack
This is a duplication attack in which a single node provides
multiple images of itself in the network when attacked. A
sin- gle node presents itself to other nodes with multiple
spoofed identifications (either MAC or network addresses).
3. BIO-INSPIRED ALGORITHM
Researchers over the past decade have explored nature to
find a comprehensive solution to the challenges faced in the
field of wireless networks. If the features of biological sys-
tems and the opposition faced by distributed network sys-
tems are studied, it is tangible to make use of bio-inspired
techniques to solve these challenges[20]. Security is an as-
pect of concern everywhere, in nature and in the networking
environment. Biologically inspired approaches for providing
security in networks are interesting to evaluate because of
the analogies between network security and how the biotic
components react to perceived threats in their surroundings.
There have been many bio-inspired approaches used as a so-
lution to the attacks which take place in a wireless sensor
network, a few of which are reviewed below:
3.1 Swarm Intelligence (SI):
The basis for swarm intelligence is the behaviour of large
groups of collaborating small insects such as ants, bees or a
flock of birds. Simple and seemingly unrelated, separately
working individuals perform complex cooperative tasks co-
ordinating with each other in a parallel and distributed
manner[12]. Similar actions are required in networks and
computer science. Thus, swarm intelligence is being used as
a template for building self-organizing systems. The main
focus lies on the formation of groups or clusters that allow
efficient task allocation mechanisms[8].
Fig 2: Swarm Intelligence
3.2 Web Spider Defence
There are various types of web spiders, a few of which use
poison to paralyze their prey once it is trapped in the
web[6].
This behaviour of spider, used to capture a prey by building
a trap (web) can be translated into the field of networks for
apprehending an attacker. This is the technique used in
conventional honeypot methods.
Fig 3: Web Spider Defence algorithm[6]
3.3 Ant Colony Optimization (ACO)
This comes under swarm intelligence approach, uses the or-
ganization and food transporting capabilities in large ant
colonies and is widely used for solving any routing related
problems in wireless networks.
Fig 4: Ant Colony Optimization (ACO)
3.4 Artificial Immune System (AIS)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 452
The immune system in animals is the basis for artificial
immune system (AIS). The immune system in animals
reacts pro-actively, even to unknown attacks, and it is a
highly adaptive process. The primary goal of AIS, which is
inspired by the ethics and processes of the immune system,
is to effectively detect changes in the environment or
deviations from the normal system behaviour [9]. Therefore,
it makes sense to apply the same mechanisms for self-
organization and self-healing operations in computer
networks.
3.5 Artificial Neural Networks (ANN)
This system is based on the organizational principles used in
human brains[12].Artificial Neural Network (ANN) is a
mas- sively parallel computing systems consisting of large
number of interconnected simple processors to handle
various types of challenging computational problem such as
in wireless sen- sor network.
Fig 5: Artificial Neural Networks (ANN)
3.6 Human Immune System
Human Immune Systems are used as a prototype to cre- ate
comprehensive and precise Intrusion Detection Systems
(IDS).The inspiration for this method comes from the hu-
man body, which is composed of many cells. Out of these
cells the most important are the lymphocytes (white blood
cells) which have the capability to distinguish between self
and non-self (foreign cells)[13].
Fig 6: Human Immune System
4. SOLUTIONS TO SOME COMMON SE-
CURITY ATTACKS IN WSN
In this section, we have tabulated a few widely accepted
con- ventional and bio-inspired solutions to some of the
known security threats in a wsn. Conventional security
mechanisms like effective key management, cryptography,
authentication, Intrusion detection System (IDS) and
biological concepts such as ant colony optimization (ACO)
(used for secure rout- ing), spider defence mechanism[6],
artificial immune system, artificial neural network are used.
The table below shows the various conventional and bio
inspired approaches that have been used to solve the attacks
that take place in the different layers of a OSI model.
5. COMPARISION BETWEEN
CONVENTIONAL AND BIO-INSPIRED
SOLUTION
5.1 Why a Bio-Inspired Solution?
When we talk about bio-inspired solution, we demonstrate a
strong relationship between the security attack and biology
through which we try to find a solution to the problem. The
indispensable question that follows is Why is it that we need
a bio-inspired solution? .The answer to this question lies in
the characteristics of the biological systems such as adapt-
ability, ability to learn and evolve when new conditions are
applied, ability to self-organize in a fully distributed fashion,
robustness[20]. And together with this there has also been a
paradigm shift in the development of computer networks
and have resulted in numerous challenges such as network
topology complexity, security among others. If one looks at
the characteristics of biological systems and the challenges
faced by distributed network systems, it is pretty evident
that one can apply bio-inspired techniques to solve these
challenges[20].
5.2 Conventional Solution vs Bio-Inspired Solution
The conventional methods, mostly rely on a central process-
ing unit (are centralized), and they depend on humans to be
programmed and told what to do (and how). This has some
very serious drawbacks. First, the systems are not very
robust. If one part of a system goes bad, the entire system
fails. Second, they are not adaptive. Most computing
systems cannot adjust or adapt to new or unexpected
situations without human intervention, unless mentioned in
the code. Third, scalability is a bare minimum.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 453
Table 1: summery of attacks in different layers and the se- curity mechanisms used
Layer Attack Conventional Security mech-
anism
Bio-inspired methodology
Physical Jamming Direct Sequence Spread Spectrum
(DSSS), Frequency Hopping Spread
Spectrum (FHSS)[4]
Swarm Intelligence[3]
Physical Node capture Frequency Hopping Spread
Spectrum (FHSS)[2]
Artificial Neural Network[11]
Network, Data
Link
Sybil Resource Testing, Random key
predistribution[5]
BIOSARP Protocol based on Ant
Colony System[21],Human Immune
System.
Network Sinkhole Hop Count Monitoring method, RSSI
Based Scheme[25]
Artificial Immune System (AIS)
Network Wormhole Packet Leashes[10], CL-MAC
Protocol[1],LEACH Protocol[18]
Swarm Intelligence[19]
Transport Flooding Game
Theory[16],Authentication, IDS
Ant Colony Optimisation
(ACO)[4]
Transport, Physical,
Network
DoS Honey pot method, progressively
stronger authentication, IDS
Web Spider Defence Method[6]
Transport De-Synchronisation Authentication, Synchronization
Cookies
Artificial Neural Networks
Transport, Network Selective
Forwardingn
Support Vector Machines (SVM),
Intrusion Detection System (IDS)[23]
Human Immune System[20]
Network Hello Flood Attack Cryptography, signal strength and
client puzzles method[24]
Ant Colony System[21]
In contrast, bio-inspired (biological) methods/computing,
process information in a parallel and distributed way, with-
out the existence of a central control (decentralized). They
usually consist of a large number of relatively simple indi-
vidual units, each performing a part of a task. Example, the
brain consists of a large number of simple neurons that are
inter-connected, that process vast amounts of information.
Similarly, in insect colonies, such as ants, a large number of
relatively simple individuals manage to build ant hills or
find a food source, in a parallel and distributed way. This
paral- lel and distributed processing method makes these
systems highly robust. It is easy to maintain the system.
Further- more, these systems are highly scalable. Also, most
systems in nature are adaptive. They can adjust to changing
situa- tions or even cope with entirely new situations.
6. CONCLUSION
In this paper, we have discussed about the importance of
providing security to wireless sensor networks. We catego-
rized and gave a summary of some common attacks that a
wireless sensor network encounters. A brief explana- tion
was also given for each attack. Few of the biological
methods/approaches that are used predominantly were re-
viewed. A comparison was made between conventional and
bio-inspired solutions, through which we have explained the
importance of bio-inspired algorithms for the optimal solu-
tions of wsn attacks. Bio-inspired algorithms have the dis-
tinctive features of being decentralized, bottom-up, adapt-
able, scalable and flexible, thus providing effective solutions
to problems that are otherwise restricted by limitations of
conventional methods.
REFERENCES
[1]. Louazani Ahmed, Sekhri Larbi, and Kechar Bouabdel-
lah. A security scheme against wormhole attack in mac layer
for delay sensitive wireless sensor networks. Inter- national
Journal of Information Technology and Com- puter Science
(IJITCS), 6(12):1, 2014.
[2]. Hari Ram Tanwar Akash Jeewan, Rashid Hussain. A
survey on the issues of security challenges and solutions of
attacks at different layers of wsn.
[3]. Abdulaziz Rashid Alazemi. Defending wsns against
jamming attacks. American Journal of Networks and
Communications, 2(2):28–39, 2013.
[4]. Nabil Ali Alrajeh, Mohamad Souheil Alabed, and Mo-
hamed Shaaban Elwahiby. Secure ant-based routing
protocol for wireless sensor network. International Jour- nal
of Distributed Sensor Networks, 2013, 2013.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 454
[5]. Nitish Balachandran and Sugata Sanyal. A review of
techniques to mitigate sybil attacks. arXiv preprint
arXiv:1207.2617, 2012.
[6]. Alejandro Canovas, Jaime Lloret, Elsa Macias, and Al-
varo Suarez. Web spider defense technique in wireless
sensor networks. International Journal of Distributed Sensor
Networks, 2014, 2014.
[7]. Menaka Chandra, Ankit Naik, and Chayya Chandra.
Study of wireless sensor networks security issues and
attacks.
[8]. Falko Dressler. Efficient and scalable communication in
autonomous networking using bio-inspired mechanisms- an
overview. Informatica, 29(2):183–8, 2005.
[9]. Falko Dressler and Ozgur B Akan. Bio-inspired
network- ing: from theory to practice. Communications
Maga- zine, IEEE, 48(11):176–183, 2010.
[10]. Mohamed Amine Ferrag and Mehdi Nafaa. An
effective method of security against wormhole attack.
[11]. Hongmei He, Zhenhuan Zhu, and Erkki Makinen. A
neural network model to minimize the connected
dominating set for self-configuration of wireless sen- sor
networks. Neural Networks, IEEE Transactions on,
20(6):973–982, 2009.
[12]. Sohail Jabbar, Rabia Iram, Abid Ali Minhas, Imran
Shafi, Shehzad Khalid, and Muqeet Ahmad. Intelli- gent
optimization of wireless sensor networks through bio-
inspired computing: survey and future directions.
International Journal of Distributed Sensor Networks, 2013,
2013.
[13]. Jungwon Kim and Peter Bentley. The human im- mune
system and network intrusion detection. In 7th European
Conference on Intelligent Techniques and Soft Computing
(EUFIT’99), Aachen, Germany, pages 1244–1252. Citeseer,
1999.
[14]. Michael Meisel, Vasileios Pappas, and Lixia Zhang. A
taxonomy of biologically inspired research in computer
networking. Computer Networks, 54(6):901–916, 2010.
[15]. Aristides Mpitziopoulos and Damianos Gavalas. An
ef- fective defensive node against jamming attacks in sen-
sor networks. Security and Communication Networks,
2(2):145–163, 2009.
[16]. Raju Neyyan, Ancy Paul, and Mayank Deshwal. Game
theory based defence mechanism against flooding at- tack
using puzzle. In IJCA Proceedings on International
Conference on Recent Advances and Future Trends in
Information Technology (iRAFIT 2012), number 2, pages
35–40. Foundation of Computer Science (FCS), 2012.
[17]. ASK Pathan, Hyung-Woo Lee, and Choong Seon
Hong. Security in wireless sensor networks: issues and chal-
lenges. In Advanced Communication Technology, 2006.
ICACT 2006. The 8th International Conference, vol- ume 2,
pages 6–pp. IEEE, 2006.
[18]. M Pushpavalli and P Mahalakshmi. Comparison of
leach protocol with wormhole attack and without worm-
hole attack in wireless sensor networks.
[19]. Heena Rathore, Venkataramana Badarla, Sushmita Jha,
and Anupam Gupta. Novel approach for security in wireless
sensor network using bio-inspirations. In COM- SNETS,
pages 1–8, 2014.
[20]. Heena Rathore and Sushmita Jha. Bio-inspired ma-
chine learning based wireless sensor network security. In
Nature and Biologically Inspired Computing (NaBIC), 2013
World Congress on, pages 140–146. IEEE, 2013.
[21]. Kashif Saleem, Norsheial Fisal, and Sharifah Hafizah.
Biosarp: biological inspired self-organized secure au-
tonomous routing protocol for wireless sensor network. In
Proceedings of the 11th WSEAS international con- ference
on Applied computer science, pages 158–165. World
Scientific and Engineering Academy and Society (WSEAS),
2011.
[22]. Jaime Lloret Sandra Sendra, 1 Lorena Parra and Shafi-
ullah Khan. Review article systems and algorithms for
wireless sensor networks based on animal and natural
behavior. International Journal of Distributed Sensor
Networks, 2015, 2015.
[23]. Bhargavi Singh. Security mechanisms for selective for-
warding attack in wireless sensor networks: Review and
analysis.
[24]. Virendra Pal Singh, Sweta Jain, and Jyoti Singhai.
Hello flood attack and its countermeasures in wireless
sensor networks. International journal of Computer Science
issues, 7(11):23–27, 2010.
[25]. Chanatip Tumrongwittayapak and Ruttikorn Varakul-
siripunth. Detecting sinkhole attacks in wireless sen- sor
networks. In ICCAS-SICE, 2009, pages 1966–1971. IEEE,
2009.
[26]. Bing Wu, Jianmin Chen, Jie Wu, and Mihaela Cardei.
A survey of attacks and countermeasures in mobile ad hoc
networks. In Wireless Network Security, pages 103–135.
Springer, 2007.

Weitere ähnliche Inhalte

Was ist angesagt?

Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017Sharonp15
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Publishing House
 
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsnPublic encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetijctet
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toeSAT Publishing House
 
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksReview of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
 
76201924
7620192476201924
76201924IJRAT
 
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...cscpconf
 
Wireless sensor networks architecture security requirements security threats...
Wireless sensor networks  architecture security requirements security threats...Wireless sensor networks  architecture security requirements security threats...
Wireless sensor networks architecture security requirements security threats...csandit
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
A survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manetsA survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manetsKhaleel Husain
 

Was ist angesagt? (17)

Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsnPublic encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsn
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
 
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksReview of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor Networks
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
 
76201924
7620192476201924
76201924
 
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
 
Wireless sensor networks architecture security requirements security threats...
Wireless sensor networks  architecture security requirements security threats...Wireless sensor networks  architecture security requirements security threats...
Wireless sensor networks architecture security requirements security threats...
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
A survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manetsA survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manets
 

Ähnlich wie A survey on bio inspired security in wireless sensor networks

A comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networksA comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networkseSAT Journals
 
A comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networksA comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networkseSAT Journals
 
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Zac Darcy
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYSECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
 
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.AIRCC Publishing Corporation
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2eSAT Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
 
Survey on Issues Related to Security Attacks in Wireless Sensor Networks (WSN)
Survey on Issues Related to Security Attacks in Wireless Sensor Networks (WSN)Survey on Issues Related to Security Attacks in Wireless Sensor Networks (WSN)
Survey on Issues Related to Security Attacks in Wireless Sensor Networks (WSN)IRJET Journal
 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wirelessIJCNCJournal
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017Sharonp15
 

Ähnlich wie A survey on bio inspired security in wireless sensor networks (19)

A comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networksA comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networks
 
A comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networksA comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networks
 
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYSECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
 
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
 
Security in ad hoc networks
Security in ad hoc networksSecurity in ad hoc networks
Security in ad hoc networks
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Security issues
Security issuesSecurity issues
Security issues
 
Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Survey on Issues Related to Security Attacks in Wireless Sensor Networks (WSN)
Survey on Issues Related to Security Attacks in Wireless Sensor Networks (WSN)Survey on Issues Related to Security Attacks in Wireless Sensor Networks (WSN)
Survey on Issues Related to Security Attacks in Wireless Sensor Networks (WSN)
 
D0961927
D0961927D0961927
D0961927
 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wireless
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 

Mehr von eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

Mehr von eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Kürzlich hochgeladen

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 

Kürzlich hochgeladen (20)

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 

A survey on bio inspired security in wireless sensor networks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 449 A SURVEY ON BIO-INSPIRED SECURITY IN WIRELESS SENSOR NETWORKS S R Mani Sekhar1 , Abhijith S2 , Bellamkonda Maruthi3 , Bharath Kumar4 , Chetan Janiwarad5 1 M S Ramiah Institute of Technology, Bangalore 2 M S Ramiah Institute of Technology, Bangalore 3 M S Ramiah Institute of Technology, Bangalore 4 M S Ramiah Institute of Technology, Bangalore 5 M S Ramiah Institute of Technology, Bangalore Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Wireless sensor networks are gaining significance in the mod- ern day world because of their wide range of potential appli- cations in the fields of science, industry, transportation, civil infrastructure, and military. Communication over wireless medium is, by nature not secure and is vulnerable to vari- ous threats and attacks. Due to deployment of the nodes in physically hostile and harsh environments, multi hop and distributed architecture, WSN is more susceptible to dif- ferent types of security attacks and threats. It is easy for an attacker to launch security attacks against physical, me- dia access, or network layer in the WSN. Therefore some sort of security mechanism is highly advisable. Establishing any efficient security scheme in wireless sensor networks is made challenging by the sensors size, processing or comput- ing power of each sensor node, memory and type of tasks expected to be performed by the sensors. In networks, security is a broad term that comprises of varied parameters like authentication, integrity, privacy, and non-repudiation [17]. A security framework in order to be agreed upon, should not violate these requirements. Al- though research in the field of sensor networks security is progressing positively, it still lacks a comprehensive inte- grated framework which can provide security to each layer and services of sensor networks. Inspired by the implicit al- luring characteristics of biological systems, many researchers are working to produce new novel design paradigms to ad- dress challenges in current network systems[14]. Fig 1: Nodes in WSN[7] Adaptabil- ity, scalability, robustness are a few of many advantages that a bio-inspired approach provides. Biological techniques usu- ally are results of efforts of generations for their struggle to survive harsh conditions. Bio-inspired algorithms are built on simple rules and are usually not complex. Attacks in WSNs can be analysed from two different views. Attacks against the mechanisms which provide security (security at- tacks) to the network and attacks against basic mechanisms like routing and other physical attacks. The different types of attacks that a network can come up against are jamming, tampering, node
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 450 capture, dos attack (physical layer), col- lision (link layer), Sybil attack, wormhole, sinkhole attack, selective forwarding (network layer) and flooding (transport layer). These attacks can be negated by using security mech- anisms like effective key management, cryptography, secure broadcasting and multicasting, Intrusion detection System (IDS). The biological algorithms: ant colony optimization (ACO) is used for secure routing, spider defence mechanism, human immune system [22] are used as templates to react to the security attacks. The rest of the paper is arranged as follows. Summary of the different types of attacks in a wire- less sensor network is given in section 2. Section 3 discusses the bio inspired algorithms studied so far. In continuation to this, in Section 5 a comparison is made between conven- tional and bio-inspired approaches to securing wsns against attacks. Conclusion is given in the last section. 2. TYPES OF ATTACKS IN WSN Here, we look at some of the attacks (discussed in the ref- erences) that tend to disrupt communications over wireless networks, and categorize these attacks based on their effects on data integrity and confidentiality, routing, identity, power consumption, privacy, and service availability and bandwidth related attacks[15]. 2.1 Data Integrity and Confidentiality 2.1.1 Node Capture Attack In Node Capture Attack, the attacker captures the sensor nodes physically and thus those nodes are compromised and the data accumulated in the nodes can be manipulated. 2.1.2 Eavesdropping Attack In Eavesdropping attack or network sniffing, as the name suggests information is retrieved from a network by snooping on data being transmitted. The attacker is clandestinely able to overhear a private conversation in an illegitimate way. 2.1.3 Denial of Service (DoS) Attack This attack is an attempt to make a network unavailable for its authorized users. This type attack is implemented by consuming the networks resources such as power supply, memory so that it can no longer provide its intended service. A DoS attack generally targets physical layer applications in an environment where sensor nodes are located. Jamming, Flooding and selective forwarding attacks discussed later are variations of DoS attack. 2.2 Power Consumption Related Attacks 2.2.1 Sleep Deprivation Torture Attack This type of attack targets the link layer. The attackers target is to minimize the lifetime of the sensor nodes by in- creasing power consumption. This can be implemented by keeping the sensor nodes busy at all times depriving it of any sleep time or rest. 2.2.2 Collision Attack In collision attack, the attacker tries to manipulate the octet configuration of transmitted packets simulating a collision. When this happens then, the packets will be discarded due to checksum mismatch. 2.3 Service Availability and Bandwidth Consumption Related Attacks 2.3.1 Flooding Attack In this type of attack, the attacker normally sends a sub- stantial number of packets to the target node or to an access point to prevent it from establishing or continuing a commu- nication path. 2.3.2 Jamming Attack This is a standard attack on a wireless sensor network, where a node or set of nodes are simply jammed. 2.3.3 Selective Forwarding Attack This attack is also known as Gray Hole attack. Here, selected packets are dropped by a forwarding node other unrelated or obsolete packets are forwarded instead. The fraudulent node might also forward the message to the wrong path, creating inconsistent routing information in the network. 2.4 Routing Related Attacks 2.4.1 Wormhole Attack In a wormhole attack or tunnel attack, an intruder manip- ulates packets at one point in the network, tunnels them to another point in the network, and then replays them into the network[26]. An attacker infringes communications from the sender, changes a portion or a whole packet, and speeds up sending the changed packet through a specific wormhole tun- nel in such a way that the altered packet arrives at the des- tination before the original packet which traverses through the usual routes. 2.4.2 Sinkhole Attack The sinkhole attack is a severe attack that prevents the base station from obtaining complete and correct data, thus forms a serious threat to higher-layer applications. In a Sinkhole attack, a compromised node tries to draw all or as much traffic as possible from a particular area. 2.4.3 Hello Flood Attack The routing paths are burdened (flooded) with hello or ACK messages 2.5 Identity Related Attacks
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 451 2.5.1 Impersonation Attack An attacker impersonates another nodes identity copying the nodes MAC or IP address to enter the network or to launch other attacks on the node. 2.5.2 Sybil Attack This is a duplication attack in which a single node provides multiple images of itself in the network when attacked. A sin- gle node presents itself to other nodes with multiple spoofed identifications (either MAC or network addresses). 3. BIO-INSPIRED ALGORITHM Researchers over the past decade have explored nature to find a comprehensive solution to the challenges faced in the field of wireless networks. If the features of biological sys- tems and the opposition faced by distributed network sys- tems are studied, it is tangible to make use of bio-inspired techniques to solve these challenges[20]. Security is an as- pect of concern everywhere, in nature and in the networking environment. Biologically inspired approaches for providing security in networks are interesting to evaluate because of the analogies between network security and how the biotic components react to perceived threats in their surroundings. There have been many bio-inspired approaches used as a so- lution to the attacks which take place in a wireless sensor network, a few of which are reviewed below: 3.1 Swarm Intelligence (SI): The basis for swarm intelligence is the behaviour of large groups of collaborating small insects such as ants, bees or a flock of birds. Simple and seemingly unrelated, separately working individuals perform complex cooperative tasks co- ordinating with each other in a parallel and distributed manner[12]. Similar actions are required in networks and computer science. Thus, swarm intelligence is being used as a template for building self-organizing systems. The main focus lies on the formation of groups or clusters that allow efficient task allocation mechanisms[8]. Fig 2: Swarm Intelligence 3.2 Web Spider Defence There are various types of web spiders, a few of which use poison to paralyze their prey once it is trapped in the web[6]. This behaviour of spider, used to capture a prey by building a trap (web) can be translated into the field of networks for apprehending an attacker. This is the technique used in conventional honeypot methods. Fig 3: Web Spider Defence algorithm[6] 3.3 Ant Colony Optimization (ACO) This comes under swarm intelligence approach, uses the or- ganization and food transporting capabilities in large ant colonies and is widely used for solving any routing related problems in wireless networks. Fig 4: Ant Colony Optimization (ACO) 3.4 Artificial Immune System (AIS)
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 452 The immune system in animals is the basis for artificial immune system (AIS). The immune system in animals reacts pro-actively, even to unknown attacks, and it is a highly adaptive process. The primary goal of AIS, which is inspired by the ethics and processes of the immune system, is to effectively detect changes in the environment or deviations from the normal system behaviour [9]. Therefore, it makes sense to apply the same mechanisms for self- organization and self-healing operations in computer networks. 3.5 Artificial Neural Networks (ANN) This system is based on the organizational principles used in human brains[12].Artificial Neural Network (ANN) is a mas- sively parallel computing systems consisting of large number of interconnected simple processors to handle various types of challenging computational problem such as in wireless sen- sor network. Fig 5: Artificial Neural Networks (ANN) 3.6 Human Immune System Human Immune Systems are used as a prototype to cre- ate comprehensive and precise Intrusion Detection Systems (IDS).The inspiration for this method comes from the hu- man body, which is composed of many cells. Out of these cells the most important are the lymphocytes (white blood cells) which have the capability to distinguish between self and non-self (foreign cells)[13]. Fig 6: Human Immune System 4. SOLUTIONS TO SOME COMMON SE- CURITY ATTACKS IN WSN In this section, we have tabulated a few widely accepted con- ventional and bio-inspired solutions to some of the known security threats in a wsn. Conventional security mechanisms like effective key management, cryptography, authentication, Intrusion detection System (IDS) and biological concepts such as ant colony optimization (ACO) (used for secure rout- ing), spider defence mechanism[6], artificial immune system, artificial neural network are used. The table below shows the various conventional and bio inspired approaches that have been used to solve the attacks that take place in the different layers of a OSI model. 5. COMPARISION BETWEEN CONVENTIONAL AND BIO-INSPIRED SOLUTION 5.1 Why a Bio-Inspired Solution? When we talk about bio-inspired solution, we demonstrate a strong relationship between the security attack and biology through which we try to find a solution to the problem. The indispensable question that follows is Why is it that we need a bio-inspired solution? .The answer to this question lies in the characteristics of the biological systems such as adapt- ability, ability to learn and evolve when new conditions are applied, ability to self-organize in a fully distributed fashion, robustness[20]. And together with this there has also been a paradigm shift in the development of computer networks and have resulted in numerous challenges such as network topology complexity, security among others. If one looks at the characteristics of biological systems and the challenges faced by distributed network systems, it is pretty evident that one can apply bio-inspired techniques to solve these challenges[20]. 5.2 Conventional Solution vs Bio-Inspired Solution The conventional methods, mostly rely on a central process- ing unit (are centralized), and they depend on humans to be programmed and told what to do (and how). This has some very serious drawbacks. First, the systems are not very robust. If one part of a system goes bad, the entire system fails. Second, they are not adaptive. Most computing systems cannot adjust or adapt to new or unexpected situations without human intervention, unless mentioned in the code. Third, scalability is a bare minimum.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 453 Table 1: summery of attacks in different layers and the se- curity mechanisms used Layer Attack Conventional Security mech- anism Bio-inspired methodology Physical Jamming Direct Sequence Spread Spectrum (DSSS), Frequency Hopping Spread Spectrum (FHSS)[4] Swarm Intelligence[3] Physical Node capture Frequency Hopping Spread Spectrum (FHSS)[2] Artificial Neural Network[11] Network, Data Link Sybil Resource Testing, Random key predistribution[5] BIOSARP Protocol based on Ant Colony System[21],Human Immune System. Network Sinkhole Hop Count Monitoring method, RSSI Based Scheme[25] Artificial Immune System (AIS) Network Wormhole Packet Leashes[10], CL-MAC Protocol[1],LEACH Protocol[18] Swarm Intelligence[19] Transport Flooding Game Theory[16],Authentication, IDS Ant Colony Optimisation (ACO)[4] Transport, Physical, Network DoS Honey pot method, progressively stronger authentication, IDS Web Spider Defence Method[6] Transport De-Synchronisation Authentication, Synchronization Cookies Artificial Neural Networks Transport, Network Selective Forwardingn Support Vector Machines (SVM), Intrusion Detection System (IDS)[23] Human Immune System[20] Network Hello Flood Attack Cryptography, signal strength and client puzzles method[24] Ant Colony System[21] In contrast, bio-inspired (biological) methods/computing, process information in a parallel and distributed way, with- out the existence of a central control (decentralized). They usually consist of a large number of relatively simple indi- vidual units, each performing a part of a task. Example, the brain consists of a large number of simple neurons that are inter-connected, that process vast amounts of information. Similarly, in insect colonies, such as ants, a large number of relatively simple individuals manage to build ant hills or find a food source, in a parallel and distributed way. This paral- lel and distributed processing method makes these systems highly robust. It is easy to maintain the system. Further- more, these systems are highly scalable. Also, most systems in nature are adaptive. They can adjust to changing situa- tions or even cope with entirely new situations. 6. CONCLUSION In this paper, we have discussed about the importance of providing security to wireless sensor networks. We catego- rized and gave a summary of some common attacks that a wireless sensor network encounters. A brief explana- tion was also given for each attack. Few of the biological methods/approaches that are used predominantly were re- viewed. A comparison was made between conventional and bio-inspired solutions, through which we have explained the importance of bio-inspired algorithms for the optimal solu- tions of wsn attacks. Bio-inspired algorithms have the dis- tinctive features of being decentralized, bottom-up, adapt- able, scalable and flexible, thus providing effective solutions to problems that are otherwise restricted by limitations of conventional methods. REFERENCES [1]. Louazani Ahmed, Sekhri Larbi, and Kechar Bouabdel- lah. A security scheme against wormhole attack in mac layer for delay sensitive wireless sensor networks. Inter- national Journal of Information Technology and Com- puter Science (IJITCS), 6(12):1, 2014. [2]. Hari Ram Tanwar Akash Jeewan, Rashid Hussain. A survey on the issues of security challenges and solutions of attacks at different layers of wsn. [3]. Abdulaziz Rashid Alazemi. Defending wsns against jamming attacks. American Journal of Networks and Communications, 2(2):28–39, 2013. [4]. Nabil Ali Alrajeh, Mohamad Souheil Alabed, and Mo- hamed Shaaban Elwahiby. Secure ant-based routing protocol for wireless sensor network. International Jour- nal of Distributed Sensor Networks, 2013, 2013.
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 454 [5]. Nitish Balachandran and Sugata Sanyal. A review of techniques to mitigate sybil attacks. arXiv preprint arXiv:1207.2617, 2012. [6]. Alejandro Canovas, Jaime Lloret, Elsa Macias, and Al- varo Suarez. Web spider defense technique in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 2014. [7]. Menaka Chandra, Ankit Naik, and Chayya Chandra. Study of wireless sensor networks security issues and attacks. [8]. Falko Dressler. Efficient and scalable communication in autonomous networking using bio-inspired mechanisms- an overview. Informatica, 29(2):183–8, 2005. [9]. Falko Dressler and Ozgur B Akan. Bio-inspired network- ing: from theory to practice. Communications Maga- zine, IEEE, 48(11):176–183, 2010. [10]. Mohamed Amine Ferrag and Mehdi Nafaa. An effective method of security against wormhole attack. [11]. Hongmei He, Zhenhuan Zhu, and Erkki Makinen. A neural network model to minimize the connected dominating set for self-configuration of wireless sen- sor networks. Neural Networks, IEEE Transactions on, 20(6):973–982, 2009. [12]. Sohail Jabbar, Rabia Iram, Abid Ali Minhas, Imran Shafi, Shehzad Khalid, and Muqeet Ahmad. Intelli- gent optimization of wireless sensor networks through bio- inspired computing: survey and future directions. International Journal of Distributed Sensor Networks, 2013, 2013. [13]. Jungwon Kim and Peter Bentley. The human im- mune system and network intrusion detection. In 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT’99), Aachen, Germany, pages 1244–1252. Citeseer, 1999. [14]. Michael Meisel, Vasileios Pappas, and Lixia Zhang. A taxonomy of biologically inspired research in computer networking. Computer Networks, 54(6):901–916, 2010. [15]. Aristides Mpitziopoulos and Damianos Gavalas. An ef- fective defensive node against jamming attacks in sen- sor networks. Security and Communication Networks, 2(2):145–163, 2009. [16]. Raju Neyyan, Ancy Paul, and Mayank Deshwal. Game theory based defence mechanism against flooding at- tack using puzzle. In IJCA Proceedings on International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012), number 2, pages 35–40. Foundation of Computer Science (FCS), 2012. [17]. ASK Pathan, Hyung-Woo Lee, and Choong Seon Hong. Security in wireless sensor networks: issues and chal- lenges. In Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, vol- ume 2, pages 6–pp. IEEE, 2006. [18]. M Pushpavalli and P Mahalakshmi. Comparison of leach protocol with wormhole attack and without worm- hole attack in wireless sensor networks. [19]. Heena Rathore, Venkataramana Badarla, Sushmita Jha, and Anupam Gupta. Novel approach for security in wireless sensor network using bio-inspirations. In COM- SNETS, pages 1–8, 2014. [20]. Heena Rathore and Sushmita Jha. Bio-inspired ma- chine learning based wireless sensor network security. In Nature and Biologically Inspired Computing (NaBIC), 2013 World Congress on, pages 140–146. IEEE, 2013. [21]. Kashif Saleem, Norsheial Fisal, and Sharifah Hafizah. Biosarp: biological inspired self-organized secure au- tonomous routing protocol for wireless sensor network. In Proceedings of the 11th WSEAS international con- ference on Applied computer science, pages 158–165. World Scientific and Engineering Academy and Society (WSEAS), 2011. [22]. Jaime Lloret Sandra Sendra, 1 Lorena Parra and Shafi- ullah Khan. Review article systems and algorithms for wireless sensor networks based on animal and natural behavior. International Journal of Distributed Sensor Networks, 2015, 2015. [23]. Bhargavi Singh. Security mechanisms for selective for- warding attack in wireless sensor networks: Review and analysis. [24]. Virendra Pal Singh, Sweta Jain, and Jyoti Singhai. Hello flood attack and its countermeasures in wireless sensor networks. International journal of Computer Science issues, 7(11):23–27, 2010. [25]. Chanatip Tumrongwittayapak and Ruttikorn Varakul- siripunth. Detecting sinkhole attacks in wireless sen- sor networks. In ICCAS-SICE, 2009, pages 1966–1971. IEEE, 2009. [26]. Bing Wu, Jianmin Chen, Jie Wu, and Mihaela Cardei. A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless Network Security, pages 103–135. Springer, 2007.