Cross Layer Security Protocol Using Swarm Intelligence
نویسندگان
چکیده
Security and privacy plays a vital role in wireless applications such as health monitoring, military and biometric identification systems. Due to the limited resource constraints in wireless sensor network, security in protocols is sacrificed or kept minimal. In this paper, a cross layer protocol is designed to detect denial of service attack imposed on the network by malicious nodes. The Denial of Service attack on sensor networks not only diminishes the network performance but also affects the reliability of the information. Swarm intelligence, an evolutionary algorithm is used in predicting the traffic patterns and detecting malicious nodes. This novel approach helps in keeping the network functional and self sustaining by re-routing the information. The sybil, worm-hole and jamming attacks are overcome using this protocol design with minimal resource exploitation. The performance of the network is evaluated based on the successful packet delivery, energy consumption and average percentage of threat detection.
منابع مشابه
Detection of Black Hole Attack In Mobile AD-HOC Networks Using Hybrid Glowworm Swarm Optimization (HGSO) Algorithm with Artificial Fish Swarm Algorithm (AFSA)
A mobile ad-hoc network is a group of mobile nodes which can communicate between them without the help of any centralized infrastructure. It consists of number of mobile nodes with exceptional quality of self-managing and selforganizing network. Military operations and disaster management are the important applications of MANET. In preventing routing attacks routing protocols plays a significan...
متن کاملCross-layer Packet-dependant OFDM Scheduling Based on Proportional Fairness
This paper assumes each user has more than one queue, derives a new packet-dependant proportional fairness power allocation pattern based on the sum of weight capacity and the packet’s priority in users’ queues, and proposes 4 new cross-layer packet-dependant OFDM scheduling schemes based on proportional fairness for heterogeneous classes of traffic. Scenario 1, scenario 2 and scenario 3 lead r...
متن کاملANSI: A Unicast Routing Protocol for Mobile Ad hoc Networks Using Swarm Intelligence
We present a reactive routing protocol for mobile ad hoc networks which uses the mechanisms of Swarm Intelligence to select next hops. Our protocol, Ad hoc Networking with Swarm Intelligence (ANSI), is a congestion-aware routing protocol, which, owing to the self-configuring mechanisms of Swarm Intelligence, is able to collect more information about the local network and make more effective rou...
متن کاملPerformance Evaluation of OLSR Using Swarm Intelligence and Hybrid Particle Swarm Optimization Using Gravitational Search Algorithm
The aim of this research is to evaluate the performance of OLSR using swarm intelligence and HPSO with Gravitational search algorithm to lower the jitter time, data drop and end to end delay and improve the network throughput. Simulation was carried out for multimedia traffic and video streamed network traffic using OPNET Simulator. Routing is exchanging of information from one host to another ...
متن کاملBalancing Energy Consumption to Maximize Network Lifetime Using Particle Swarm Optimization in Wireless Sensor Networks
A Wireless sensor network of globally distributed autonomous sensors to monitor physical or environmental conditions such as temperature, noise, pressure etc. and to cooperatively pass their data through the network to a main location. CASER protocol is used to increase the lifetime of the network. Energy consumption and security are the two conflicting issues in WSN. To overcome this problem s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002