Impact of Misbehaviour and its Detection in Ad-hoc Wireless Sensor Networks using AIS

نویسندگان

  • Sven Schaust
  • Martin Drozda
  • Helena Szczerbicka
چکیده

Characteristic for ad-hoc wireless sensor networks is the lack of a centralized control. Instead each node serves as a routing device, which is able to forward packets to its neighbors1 and receive packets from them. Node movement is allowed, but rare for sensor nodes. Each node is able to be switched on and off at any time depending on its power saving configuration. Such networks are extremely vulnerable to user misbehavior. Since nodes within an ad-hoc sensor network are expected to have limited computational power and be battery powered, a system that is going to protect them has to be lightweight. It has to be adaptive too, as ad-hoc sensor networks are expected to operate autonomously with only spare maintenance. Classical intrusion detection approaches which are based on intrusion signatures therefore do not apply for such a task. Artificial immune systems (AIS) on the other hand seem capable of handling such demands. AIS are inspired by the Human immune system (HIS) using selected features of this defense system. The basic feature of an HIS is the ability to discriminate between self and non-self. In case of sensor networks non-self is any kind of user behavior that impacts the network in a negative way. The purpose of our simulation based experiments is to show that AIS are a suitable approach for detecting misbehavior in ad hoc sensor networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Congestion Control Approaches Applied to Wireless Sensor Networks: A Survey

Wireless Sensor Networks (WSNs) are a specific category of wireless ad-hoc networks where their performance is highly affected by application, life time, storage capacity, processing power, topology changes, the communication medium and bandwidth. These limitations necessitate an effective data transport control in WSNs considering quality of service, energy efficiency, and congestion control. ...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

A Novel Comprehensive Taxonomy of Intelligent-Based Routing Protocols in Wireless Sensor Networks

Routing in ad-hoc networks, specifically intelligent-based ones, is a highly interested research topic in recent years. Most of them are simulation-based study. Large percentages have not even mentioned some of the fundamental parameters. This strictly reduces their validity and reliability. On the other hand, there is not a comprehensive framework to classify routing algorithms in wireless sen...

متن کامل

FDMG: Fault detection method by using genetic algorithm in clustered wireless sensor networks

Wireless sensor networks (WSNs) consist of a large number of sensor nodes which are capable of sensing different environmental phenomena and sending the collected data to the base station or Sink. Since sensor nodes are made of cheap components and are deployed in remote and uncontrolled environments, they are prone to failure; thus, maintaining a network with its proper functions even when und...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006