Performance Analysis for IDBAS and LWSEA Cryptography Technique in Generic Bio-Inspired Cybersecurity in SIWC model for WSN

Authors

  • A. V. Vivekia  Department of Information Technology, Sri Venkateswara College of EngineeringChennai, Tamil Nadu, India
  • Dr. N. Kumaratharan  Department of Information Technology, Sri Venkateswara College of EngineeringChennai, Tamil Nadu, India

Keywords:

Cyber-physical systems (CPSs), Cybersecurity, Cyberattacks, Swarm Intelligence for WSN Cybersecurity (SIWC), Swarm based Intrusion Detection System (SIDS), Light-weight Symmetric Encryption algorithm (LWSEA).

Abstract

The expeditious advances of Information Technology (IT) and Communication Technology have led in various Cyber-Physical Systems (CPSs) such as smart traffic flow management, healthcare platforms, Internet of Things and computer networks. In current days the Wireless Sensor Networks (WSNs) play a pivotal role in CPSs, particularly for operations such as surveillance and monitoring. However, these WSNs are vulnerable to various types of security attacks known as cyber-attacks. To strengthen cybersecurity in WSN-enabled CPSs, a generic bio-inspired model called Swarm Intelligence is proposed. Swarm Intelligence for WSN Cybersecurity (SIWC) is a system trained by swarm intelligence optimization to automatically determine the optimal critical parameters that are used to detect cyberattacks using SIDS and prevent them by using cryptography LWSEA techniques.

References

  1. R. V. Kulkarni and G. K. Venayagamoorthy (2009) ‘Neural Network based Secure Media Access Control Protocol for Wireless Sensor Networks’, Neural Networks, Vol.10 , pp. 7-11.
  2. S Markovich – Golan (2011) ‘Distributed Multiple Constraints Generalized Side lobe Canceler for Fully Connected Wireless Acoustic Sensor Networks’, Wireless sensor networks, Vol.12 , pp. 1847-1864.
  3. J Yang - (2013) ‘Detection and Localization of Multiple Spoofing Attackers in Wireless Networks’, Vol.13 , pp. 7-13
  4. C. Karlof and D. Wagner, (2003) ‘Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures’, Workshop Sensor Network Protocols and Applications, Vol.11, pp. 237-354
  5. H. Zhang and H. Shen, June (2016) ‘Bio-Inspired Cybersecurity for Wireless Sensor Networks’, IEEE Communication Magazine, Vol. 19 pp. 340-347
  6. W. A. H. Ghanem and A. Jantan, (2014) ‘Swarm Intelligence and Neural Network for Data Classification’, Proc. IEEE Int’l.Conf. Control System, Computing and Engineering, Vol. pp. 1969-2015.
  7. C. Biener, M. Eling, and J. H. Wirfs, (2015) ‘Insurability of Cyber Risk: An Empirical Analysis’, The   Geneva Papers on Risk and Insurance–Issues and Practice, vol. pp. 131–58.
  8. D. S. Ghataoura, J. E. Mitchell, and G. E. Matich, (2011) ‘Networking and Application Interface Technology for Wireless Sensor Network Surveillance and Monitoring’, Vol. pp. 90–97.
  9. A. Oracevic, (2014) ‘Secure Tasrget Detection and Tracking in Mission Critical Wireless Sensor Networks’, Vol. pp. 1–5. 
  10. D. J. John et al., (2014) ‘Evolutionary Based Moving Target Cyber Defense’, Proc. ACM Conf. Genetic and Evolutionary Computation, Vol. pp. 1261–68.
  11. Sohrabi K, Gao J, Ailawadhi V & Pottie GJ (2000) ‘Protocols for self-organization of a wireless sensor network’, IEEE  Pers Communication, Vol.7, pp. 16-27.

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
A. V. Vivekia, Dr. N. Kumaratharan, " Performance Analysis for IDBAS and LWSEA Cryptography Technique in Generic Bio-Inspired Cybersecurity in SIWC model for WSN, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.87-95, May-June-2017.