Performance Analysis for IDBAS and LWSEA Cryptography Technique in Generic Bio-Inspired Cybersecurity in SIWC model for WSN

Authors(2) :-A. V. Vivekia, Dr. N. Kumaratharan

The expeditious advances of Information Technology (IT) and Communication Technology have led in various Cyber-Physical Systems (CPSs) such as smart traffic flow management, healthcare platforms, Internet of Things and computer networks. In current days the Wireless Sensor Networks (WSNs) play a pivotal role in CPSs, particularly for operations such as surveillance and monitoring. However, these WSNs are vulnerable to various types of security attacks known as cyber-attacks. To strengthen cybersecurity in WSN-enabled CPSs, a generic bio-inspired model called Swarm Intelligence is proposed. Swarm Intelligence for WSN Cybersecurity (SIWC) is a system trained by swarm intelligence optimization to automatically determine the optimal critical parameters that are used to detect cyberattacks using SIDS and prevent them by using cryptography LWSEA techniques.

Authors and Affiliations

A. V. Vivekia
Department of Information Technology, Sri Venkateswara College of EngineeringChennai, Tamil Nadu, India
Dr. N. Kumaratharan
Department of Information Technology, Sri Venkateswara College of EngineeringChennai, Tamil Nadu, India

Cyber-physical systems (CPSs), Cybersecurity, Cyberattacks, Swarm Intelligence for WSN Cybersecurity (SIWC), Swarm based Intrusion Detection System (SIDS), Light-weight Symmetric Encryption algorithm (LWSEA).

  1. R. V. Kulkarni and G. K. Venayagamoorthy (2009) ‘Neural Network based Secure Media Access Control Protocol for Wireless Sensor Networks’, Neural Networks, Vol.10 , pp. 7-11.
  2. S Markovich – Golan (2011) ‘Distributed Multiple Constraints Generalized Side lobe Canceler for Fully Connected Wireless Acoustic Sensor Networks’, Wireless sensor networks, Vol.12 , pp. 1847-1864.
  3. J Yang - (2013) ‘Detection and Localization of Multiple Spoofing Attackers in Wireless Networks’, Vol.13 , pp. 7-13
  4. C. Karlof and D. Wagner, (2003) ‘Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures’, Workshop Sensor Network Protocols and Applications, Vol.11, pp. 237-354
  5. H. Zhang and H. Shen, June (2016) ‘Bio-Inspired Cybersecurity for Wireless Sensor Networks’, IEEE Communication Magazine, Vol. 19 pp. 340-347
  6. W. A. H. Ghanem and A. Jantan, (2014) ‘Swarm Intelligence and Neural Network for Data Classification’, Proc. IEEE Int’l.Conf. Control System, Computing and Engineering, Vol. pp. 1969-2015.
  7. C. Biener, M. Eling, and J. H. Wirfs, (2015) ‘Insurability of Cyber Risk: An Empirical Analysis’, The   Geneva Papers on Risk and Insurance–Issues and Practice, vol. pp. 131–58.
  8. D. S. Ghataoura, J. E. Mitchell, and G. E. Matich, (2011) ‘Networking and Application Interface Technology for Wireless Sensor Network Surveillance and Monitoring’, Vol. pp. 90–97.
  9. A. Oracevic, (2014) ‘Secure Tasrget Detection and Tracking in Mission Critical Wireless Sensor Networks’, Vol. pp. 1–5. 
  10. D. J. John et al., (2014) ‘Evolutionary Based Moving Target Cyber Defense’, Proc. ACM Conf. Genetic and Evolutionary Computation, Vol. pp. 1261–68.
  11. Sohrabi K, Gao J, Ailawadhi V & Pottie GJ (2000) ‘Protocols for self-organization of a wireless sensor network’, IEEE  Pers Communication, Vol.7, pp. 16-27.

Publication Details

Published in : Volume 2 | Issue 3 | May-June 2017
Date of Publication : 2017-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 87-95
Manuscript Number : CSEIT1722401
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

A. V. Vivekia, Dr. N. Kumaratharan, "Performance Analysis for IDBAS and LWSEA Cryptography Technique in Generic Bio-Inspired Cybersecurity in SIWC model for WSN", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.87-95, May-June.2017
URL : http://ijsrcseit.com/CSEIT1722401

Follow Us

Contact Us