Skip to main content

Towards a Bio-inspired Security Framework for Mission-Critical Wireless Sensor Networks

  • Conference paper
Computational Intelligence and Intelligent Systems (ISICA 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 51))

Included in the following conference series:

Abstract

Mission-critical wireless sensor networks (WSNs) have been found in numerous promising applications in civil and military fields. However, the functionality of WSNs extensively relies on its security capability for detecting and defending sophisticated adversaries, such as Sybil, worm hole and mobile adversaries. In this paper, we propose a bio-inspired security framework to provide intelligence-enabled security mechanisms. This scheme is composed of a middleware, multiple agents and mobile agents. The agents monitor the network packets, host activities, make decisions and launch corresponding responses. Middleware performs an infrastructure for the communication between various agents and corresponding mobility. Certain cognitive models and intelligent algorithms such as Layered Reference Model of Brain and Self-Organizing Neural Network with Competitive Learning are explored in the context of sensor networks that have resource constraints. The security framework and implementation are also described in details.

Supported by the Science and Research Start-Up Project for the Recruit Talent of China University of Geosciences, Wuhan, under Grant No.20090113.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chong, C.Y., Kumar, S.P.: Sensor Networks: Evolution, Opportunities, and Challenges, Invited Paper. In: Proc. IEEE (August 2003)

    Google Scholar 

  2. Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  3. Newsome, J., Shi, E., Song, D., et al.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proc. of the third International Symposium on Information Processing in Sensor Networks, pp. 259–268. ACM Press, New York (2004)

    Chapter  Google Scholar 

  4. Deng, J., Han, R., Mishra, S.: Countermeasures Against Traffic Analysis in Wireless Sensor Networks. Technical Report CU-CS-987-04, University of Colorado at Boulder (2004)

    Google Scholar 

  5. Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: Proc. of IEEE Symposium on Security and Privacy, SP 2005 (May 2005)

    Google Scholar 

  6. Gruteser, M., Schelle, G., Jain, A., et al.: Privacy-aware Location Sensor Networks. In: Proc. of 9th USENIX Workshop on Hot Topics in Operating Systems, HotOS IX (2003)

    Google Scholar 

  7. Ozturk, C., Zhang, Y., Trappe, W.: Source-location Privacy in Energy Constrained Sensor Network Routing. In: Proc. of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks (2004)

    Google Scholar 

  8. Milojicic, D.: Mobile Agent Applications. IEEE Concurrency 7(3), 80–90 (1999)

    Article  Google Scholar 

  9. Tynan, R., O’Hare, G.M.P., Marsh, D., et al.: Intelligent Agents for Wireless Sensor Networks. In: Proc. of the Fourth International Joint Conference on Autonomous Agents and Multi Agent Systems (AAMAS 2005), Netherlands (2005)

    Google Scholar 

  10. Singhvi, V., Krause, A., Guestrin, C.: Intelligent Light Control using Sensor Networks. In: Proc. of ACM SenSys 2005, California, USA (2005)

    Google Scholar 

  11. Sandhu, J., Agogino, A., Agogino, A.: Wireless Sensor Networks for Commercial Lighting Control: Decision Making with Multi-agent Systems. In: Proc. of AAAI Workshop on Sensor Networks (2004)

    Google Scholar 

  12. Khan, A.I., Mihailescu, P.: Parallel Pattern Recognition Computations within a Wireless Sensor Network. In: Proc. of the 17th International Conference on Pattern Recognition, ICPR 2004 (2004)

    Google Scholar 

  13. Marsh, D., Tynan, R., O’Kane, D., et al.: Autonomic Wireless Sensor Networks. Engineering Applications of Artificial Intelligence Journal (17), 741–748 (2004)

    Article  Google Scholar 

  14. Wang, Y., Wang, Y., Patel, S., Patel, D.: A Layered Reference Model of the Brain (LRMB). IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews 36(2), 124–133 (2006)

    Article  Google Scholar 

  15. Wang, Y.: The Real-Time Process Algebra (RTPA). International Journal of Annals of Software Engineering 14, 235–274 (2002)

    Article  MATH  Google Scholar 

  16. Sarafijanovic, S., Boudec, J.: An Artificial Immune System Approach with Secondary Response for Misbehavior Detection in Mobile Ad-Hoc Networks. IEEE Transactions on Neural Networks, Special Issue on Adaptive Learning Systems in Communication Networks 16(5), 1076–1087 (2005)

    Google Scholar 

  17. Das, S.K., Banerjee, N., Roy, A.: Solving Optimization Problems in Wireless Networks using Genetic Algorithms. Handbook of Bioinspired Algorithms (2004)

    Google Scholar 

  18. Dressler, F., Krüger, B.: Cell biology as a Key to Computer Networking. In: Proc. of German Conference on Bioinformatics (GCB 2004), Bielefeld, Germany, Abstract and Poster (October 2004)

    Google Scholar 

  19. Rosenbloom, P.S., Laird, J.E., Newell, A.: The SOAR Papers: Research on Integrated Intelligence. MIT Press, Cambridge (1992)

    Google Scholar 

  20. Gorski, N.A., Laird, J.E.: Experiments in Transfer across Multiple Learning Mechanisms. In: Proc. of the ICML 2006 Workshop on Structural Knowledge Transfer for Machine Learning, Pittsburgh, PA (2006)

    Google Scholar 

  21. Shapiro, D., Langley, P.: Controlling Physical Agents through Reactive Logic Programming. In: Proc. of the Third international Conference on Autonomous Agents, pp. 386–387 (1999)

    Google Scholar 

  22. Fok, C.-L., Roman, G.C., Lu, C.: Mobile agent middleware for sensor networks: An application case study, Technical Report WUCSE-04-73, Washington University, Department of Computer Science and Engineering, St. Louis (2004)

    Google Scholar 

  23. Hui, J., Culler, D.: The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale. In: Proc. of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 81–94. ACM Press, New York (2004)

    Chapter  Google Scholar 

  24. Boulis, A., Han, C.C., Srivastava, M.: Design and Implementation of a Framework for Efficient and Programmable Sensor Networks. In: Proc. of the International Conference on Mobile Systems, Applications, and Services, MobiSys 2003 (2003)

    Google Scholar 

  25. Liu, T., Martonosi, M.: Impala: A middleware System for Managing Autonomic, Parallel Sensor Systems. In: Proc. of ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (2003)

    Google Scholar 

  26. Boonma, P., Champrasert, P., Suzuki, J.: BiSNET: A Biologically-Inspired Architecture for Wireless Sensor Networks. In: Proc. of the 2nd IEEE International Conference on Autonomic and Autonomous Systems, CA, USA (July 2006)

    Google Scholar 

  27. Boonma, P., Champrasert, P., Suzuki, J.: A Biologically-Inspired Architecture for Self-Managing Sensor Networks. In: Proc. of the Third IEEE International Workshop on Wireless Ad hoc and Sensor Networks, New York City, NY (June 2006)

    Google Scholar 

  28. Rumelhart, D.E., Zipser, D.: Feature discovery by competitive learning. Cognitive Science 9, 75–112 (1985)

    Google Scholar 

  29. Crossbow Inc., http://www.xbow.com/

  30. Levis, P., Lee, N., Welsh, M., et al.: TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications. In: Proc. of First ACM Conference on Embedded Networked Sensor Systems (ACM SenSys 2003), November 2003, pp. 126–137 (2003)

    Google Scholar 

  31. Peysakhov, M., Artz, D., Sultanik, E., et al.: Network Awareness for Mobile Agent on Ad Hoc Networks. In: Proc. of International Joint Conference on Autonomous Agents and Multiagent System (AAMAS 2004), New York, USA (July 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ren, W., Song, J., Ma, Z., Huang, S. (2009). Towards a Bio-inspired Security Framework for Mission-Critical Wireless Sensor Networks. In: Cai, Z., Li, Z., Kang, Z., Liu, Y. (eds) Computational Intelligence and Intelligent Systems. ISICA 2009. Communications in Computer and Information Science, vol 51. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04962-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04962-0_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04961-3

  • Online ISBN: 978-3-642-04962-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics