An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP

  • Kashif Saleem
  • Norsheila Fisal
  • Sharifah Hafizah
  • Rozeha A. Rashid
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6694)


In multihop wireless sensor network (WSN) users or nodes are constantly entering and leaving the network. Classical techniques for network management and control are not conceived to efficiently face such challenges. New mechanisms are required, to work in a self-organized manner. The techniques found in nature promises WSN, to self-adapt the environmental changes and also self-protect itself from the malicious stuff. This paper introduces a biological inspired secure autonomous routing protocol (BIOSARP). The self-optimized routing protocol is enhanced with artificial Immune System (AIS) based autonomous security mechanism. It enhances WSN in securing itself from the abnormalities and most common WSN routing attacks. NS2 based simulation analysis and results of BIOSARP are presented. The comparison of proposed intelligent protocol with SAID and SRTLD security mechanisms for WSN is further exhibited, in terms of processing time and energy consumption.


Artificial Immune system Human Immune Blood Brain Barrier System Human Immune System Intelligence Self-Optimization Self-Security Wireless Sensor Network 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Balasubramaniam, S., Botvich, D., Donnelly, W., Foghluh, M., Strassner, J.: Biologically Inspired Self-Governance and Self-Organisation for Autonomic Networks. In: Proceedings of the 1st International Conference on Bio Inspired Models of Network, Information and Computing Systems, vol. 275, p. 30. ACM, Cavalese (2006)Google Scholar
  2. 2.
    Balasubramaniam, S., Donnelly, W., Botvich, D., Agoulmine, N., Strassner, J.: Towards integrating principles of Molecular Biology for Autonomic Network Management. In: Hewlett Packard University Association (HPOVUA) Conference, Nice, France (2006)Google Scholar
  3. 3.
    Boonma, P., Suzuki, J.: MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks. In: Proc. of the 41st Hawaii International Conference on System Sciences (HICSS), Big Island, HI (2008)Google Scholar
  4. 4.
    Mazhar, N., Farooq, M.: BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc. In: de Castro, L.N., Von Zuben, F.J., Knidel, H. (eds.) ICARIS 2007. LNCS, vol. 4628, pp. 370–381. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Wedde, H.F., Farooq, M., Pannenbaecker, T., Vogel, B., Mueller, C., Meth, J., Jeruschkat, R.: BeeAdHoc: An Energy Efficient Routing Algorithm for Mobile Ad Hoc Networks Inspired by Bee Behavior. In: GECCO, vol. 1-59593-010-8/05/0006, ACM, Washington, DC (2005)Google Scholar
  6. 6.
    Saleem, K., Fisal, N., Baharudin, M.A., Ahmed, A.A., Hafizah, S., Kamilah, S.: Ant Colony Inspired Self-Optimized Routing Protocol based on Cross Layer Architecture for Wireless Sensor Networks. Wseas Transactions on Communications (WTOC) 9, 669–678 (2010)Google Scholar
  7. 7.
    Saleem, K., Fisal, N., Hafizah, S., Kamilah, S., Rashid, R., Baguda, Y.: Cross Layer based Biological Inspired Self-Organized Routing Protocol for Wireless Sensor Network. In: TENCON 2009. IEEE, Singapore (2009)Google Scholar
  8. 8.
    Saleem, K., Fisal, N., Hafizah, S., Kamilah, S., Rashid, R.: A Self-Optimized Multipath Routing Protocol for Wireless Sensor Networks. International Journal of Recent Trends in Engineering (IJRTE) 2 (2009)Google Scholar
  9. 9.
    Ali, A., Fisal, N.: Security enhancement for real-time routing protocol in wireless sensor networks. In: 5th IFIP International Conference on Wireless and Optical Communications Networks, WOCN 2008, pp. 1–5 (2008)Google Scholar
  10. 10.
    Ma, J., Zhang, S., Zhong, Y., Tong, X.: SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks. Information Security Applications, 60–73 (2007)Google Scholar
  11. 11.
    Pathan, A.K., Lee, H.W., Hong, C.S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proceedings of 8th IEEE ICACT 2006, Phoenix Park, Korea, vol. II, pp. 1043–1048 (2006)Google Scholar
  12. 12.
    Lim, C.H.: LEAP++: A Robust Key Establishment Scheme forWireless Sensor Networks. In: The 28th International Conference on Distributed Computing Systems Workshops, vol. 1545-0678/08. IEEE, Beijing (2008)Google Scholar
  13. 13.
    Wang, H., Sheng, B., Tan, C.C., Li, Q.: Comparing Symmetric-key and Public-key based Security Schemes in Sensor Networks: A Case Study of User Access Control. In: The 28th International Conference on Distributed Computing Systems, vol. 1063-6927/08. IEEE, Beijing (2008)Google Scholar
  14. 14.
    Saleem, K., Fisal, N., Abdullah, M.S., Zulkarmwan, A.B., Hafizah, S., Kamilah, S.: Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs. In: Asian Conference on Intelligent Information and Database Systems, pp. 277–282. IEEE, Quang Binh University, Dong Hoi City (2009)Google Scholar
  15. 15.
    Li, G., He, J., Fu, Y.: A Distributed Intrusion Detection Scheme for Wireless Sensor Networks. In: The 28th International Conference on Distributed Computing Systems Workshops, pp. 309–314. IEEE, Beijing (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Kashif Saleem
    • 1
  • Norsheila Fisal
    • 1
  • Sharifah Hafizah
    • 1
  • Rozeha A. Rashid
    • 1
  1. 1.Telematic Research Group, Faculty of Electrical EngineeringUniversiti Teknologi MalaysiaSkudaiMalaysia

Personalised recommendations