Performance Analysis for IDBAS and LWSEA Cryptography Technique in Generic Bio-Inspired Cybersecurity in SIWC model for WSN
Keywords:
Cyber-physical systems (CPSs), Cybersecurity, Cyberattacks, Swarm Intelligence for WSN Cybersecurity (SIWC), Swarm based Intrusion Detection System (SIDS), Light-weight Symmetric Encryption algorithm (LWSEA).Abstract
The expeditious advances of Information Technology (IT) and Communication Technology have led in various Cyber-Physical Systems (CPSs) such as smart traffic flow management, healthcare platforms, Internet of Things and computer networks. In current days the Wireless Sensor Networks (WSNs) play a pivotal role in CPSs, particularly for operations such as surveillance and monitoring. However, these WSNs are vulnerable to various types of security attacks known as cyber-attacks. To strengthen cybersecurity in WSN-enabled CPSs, a generic bio-inspired model called Swarm Intelligence is proposed. Swarm Intelligence for WSN Cybersecurity (SIWC) is a system trained by swarm intelligence optimization to automatically determine the optimal critical parameters that are used to detect cyberattacks using SIDS and prevent them by using cryptography LWSEA techniques.
References
- R. V. Kulkarni and G. K. Venayagamoorthy (2009) ‘Neural Network based Secure Media Access Control Protocol for Wireless Sensor Networks’, Neural Networks, Vol.10 , pp. 7-11.
- S Markovich – Golan (2011) ‘Distributed Multiple Constraints Generalized Side lobe Canceler for Fully Connected Wireless Acoustic Sensor Networks’, Wireless sensor networks, Vol.12 , pp. 1847-1864.
- J Yang - (2013) ‘Detection and Localization of Multiple Spoofing Attackers in Wireless Networks’, Vol.13 , pp. 7-13
- C. Karlof and D. Wagner, (2003) ‘Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures’, Workshop Sensor Network Protocols and Applications, Vol.11, pp. 237-354
- H. Zhang and H. Shen, June (2016) ‘Bio-Inspired Cybersecurity for Wireless Sensor Networks’, IEEE Communication Magazine, Vol. 19 pp. 340-347
- W. A. H. Ghanem and A. Jantan, (2014) ‘Swarm Intelligence and Neural Network for Data Classification’, Proc. IEEE Int’l.Conf. Control System, Computing and Engineering, Vol. pp. 1969-2015.
- C. Biener, M. Eling, and J. H. Wirfs, (2015) ‘Insurability of Cyber Risk: An Empirical Analysis’, The Geneva Papers on Risk and Insurance–Issues and Practice, vol. pp. 131–58.
- D. S. Ghataoura, J. E. Mitchell, and G. E. Matich, (2011) ‘Networking and Application Interface Technology for Wireless Sensor Network Surveillance and Monitoring’, Vol. pp. 90–97.
- A. Oracevic, (2014) ‘Secure Tasrget Detection and Tracking in Mission Critical Wireless Sensor Networks’, Vol. pp. 1–5.
- D. J. John et al., (2014) ‘Evolutionary Based Moving Target Cyber Defense’, Proc. ACM Conf. Genetic and Evolutionary Computation, Vol. pp. 1261–68.
- Sohrabi K, Gao J, Ailawadhi V & Pottie GJ (2000) ‘Protocols for self-organization of a wireless sensor network’, IEEE Pers Communication, Vol.7, pp. 16-27.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.