Abstract
Mission-critical wireless sensor networks (WSNs) have been found in numerous promising applications in civil and military fields. However, the functionality of WSNs extensively relies on its security capability for detecting and defending sophisticated adversaries, such as Sybil, worm hole and mobile adversaries. In this paper, we propose a bio-inspired security framework to provide intelligence-enabled security mechanisms. This scheme is composed of a middleware, multiple agents and mobile agents. The agents monitor the network packets, host activities, make decisions and launch corresponding responses. Middleware performs an infrastructure for the communication between various agents and corresponding mobility. Certain cognitive models and intelligent algorithms such as Layered Reference Model of Brain and Self-Organizing Neural Network with Competitive Learning are explored in the context of sensor networks that have resource constraints. The security framework and implementation are also described in details.
Supported by the Science and Research Start-Up Project for the Recruit Talent of China University of Geosciences, Wuhan, under Grant No.20090113.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chong, C.Y., Kumar, S.P.: Sensor Networks: Evolution, Opportunities, and Challenges, Invited Paper. In: Proc. IEEE (August 2003)
Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. Computer 35(10), 54–62 (2002)
Newsome, J., Shi, E., Song, D., et al.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proc. of the third International Symposium on Information Processing in Sensor Networks, pp. 259–268. ACM Press, New York (2004)
Deng, J., Han, R., Mishra, S.: Countermeasures Against Traffic Analysis in Wireless Sensor Networks. Technical Report CU-CS-987-04, University of Colorado at Boulder (2004)
Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: Proc. of IEEE Symposium on Security and Privacy, SP 2005 (May 2005)
Gruteser, M., Schelle, G., Jain, A., et al.: Privacy-aware Location Sensor Networks. In: Proc. of 9th USENIX Workshop on Hot Topics in Operating Systems, HotOS IX (2003)
Ozturk, C., Zhang, Y., Trappe, W.: Source-location Privacy in Energy Constrained Sensor Network Routing. In: Proc. of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks (2004)
Milojicic, D.: Mobile Agent Applications. IEEE Concurrency 7(3), 80–90 (1999)
Tynan, R., O’Hare, G.M.P., Marsh, D., et al.: Intelligent Agents for Wireless Sensor Networks. In: Proc. of the Fourth International Joint Conference on Autonomous Agents and Multi Agent Systems (AAMAS 2005), Netherlands (2005)
Singhvi, V., Krause, A., Guestrin, C.: Intelligent Light Control using Sensor Networks. In: Proc. of ACM SenSys 2005, California, USA (2005)
Sandhu, J., Agogino, A., Agogino, A.: Wireless Sensor Networks for Commercial Lighting Control: Decision Making with Multi-agent Systems. In: Proc. of AAAI Workshop on Sensor Networks (2004)
Khan, A.I., Mihailescu, P.: Parallel Pattern Recognition Computations within a Wireless Sensor Network. In: Proc. of the 17th International Conference on Pattern Recognition, ICPR 2004 (2004)
Marsh, D., Tynan, R., O’Kane, D., et al.: Autonomic Wireless Sensor Networks. Engineering Applications of Artificial Intelligence Journal (17), 741–748 (2004)
Wang, Y., Wang, Y., Patel, S., Patel, D.: A Layered Reference Model of the Brain (LRMB). IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews 36(2), 124–133 (2006)
Wang, Y.: The Real-Time Process Algebra (RTPA). International Journal of Annals of Software Engineering 14, 235–274 (2002)
Sarafijanovic, S., Boudec, J.: An Artificial Immune System Approach with Secondary Response for Misbehavior Detection in Mobile Ad-Hoc Networks. IEEE Transactions on Neural Networks, Special Issue on Adaptive Learning Systems in Communication Networks 16(5), 1076–1087 (2005)
Das, S.K., Banerjee, N., Roy, A.: Solving Optimization Problems in Wireless Networks using Genetic Algorithms. Handbook of Bioinspired Algorithms (2004)
Dressler, F., Krüger, B.: Cell biology as a Key to Computer Networking. In: Proc. of German Conference on Bioinformatics (GCB 2004), Bielefeld, Germany, Abstract and Poster (October 2004)
Rosenbloom, P.S., Laird, J.E., Newell, A.: The SOAR Papers: Research on Integrated Intelligence. MIT Press, Cambridge (1992)
Gorski, N.A., Laird, J.E.: Experiments in Transfer across Multiple Learning Mechanisms. In: Proc. of the ICML 2006 Workshop on Structural Knowledge Transfer for Machine Learning, Pittsburgh, PA (2006)
Shapiro, D., Langley, P.: Controlling Physical Agents through Reactive Logic Programming. In: Proc. of the Third international Conference on Autonomous Agents, pp. 386–387 (1999)
Fok, C.-L., Roman, G.C., Lu, C.: Mobile agent middleware for sensor networks: An application case study, Technical Report WUCSE-04-73, Washington University, Department of Computer Science and Engineering, St. Louis (2004)
Hui, J., Culler, D.: The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale. In: Proc. of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 81–94. ACM Press, New York (2004)
Boulis, A., Han, C.C., Srivastava, M.: Design and Implementation of a Framework for Efficient and Programmable Sensor Networks. In: Proc. of the International Conference on Mobile Systems, Applications, and Services, MobiSys 2003 (2003)
Liu, T., Martonosi, M.: Impala: A middleware System for Managing Autonomic, Parallel Sensor Systems. In: Proc. of ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (2003)
Boonma, P., Champrasert, P., Suzuki, J.: BiSNET: A Biologically-Inspired Architecture for Wireless Sensor Networks. In: Proc. of the 2nd IEEE International Conference on Autonomic and Autonomous Systems, CA, USA (July 2006)
Boonma, P., Champrasert, P., Suzuki, J.: A Biologically-Inspired Architecture for Self-Managing Sensor Networks. In: Proc. of the Third IEEE International Workshop on Wireless Ad hoc and Sensor Networks, New York City, NY (June 2006)
Rumelhart, D.E., Zipser, D.: Feature discovery by competitive learning. Cognitive Science 9, 75–112 (1985)
Crossbow Inc., http://www.xbow.com/
Levis, P., Lee, N., Welsh, M., et al.: TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications. In: Proc. of First ACM Conference on Embedded Networked Sensor Systems (ACM SenSys 2003), November 2003, pp. 126–137 (2003)
Peysakhov, M., Artz, D., Sultanik, E., et al.: Network Awareness for Mobile Agent on Ad Hoc Networks. In: Proc. of International Joint Conference on Autonomous Agents and Multiagent System (AAMAS 2004), New York, USA (July 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ren, W., Song, J., Ma, Z., Huang, S. (2009). Towards a Bio-inspired Security Framework for Mission-Critical Wireless Sensor Networks. In: Cai, Z., Li, Z., Kang, Z., Liu, Y. (eds) Computational Intelligence and Intelligent Systems. ISICA 2009. Communications in Computer and Information Science, vol 51. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04962-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-04962-0_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04961-3
Online ISBN: 978-3-642-04962-0
eBook Packages: Computer ScienceComputer Science (R0)