Expressive and Deployable Swarm Intelligence Based Cybersecurity for Wireless Sensor Network

Authors

  • I. Govindharajn  Associate Professor, Department of Computer Science & Engineering, Sri Manakula Vinayagar Engineering College, Puducherry, Tamil Nadu, India
  • P. Jeeva  UG Student, Department of Computer Science & Engineering, Sri Manakula Vinayagar Engineering College, Puducherry, Tamil Nadu, India
  • M. Kanimozhi  UG Student, Department of Computer Science & Engineering, Sri Manakula Vinayagar Engineering College, Puducherry, Tamil Nadu, India
  • S. Kodieswari  UG Student, Department of Computer Science & Engineering, Sri Manakula Vinayagar Engineering College, Puducherry, Tamil Nadu, India
  • A. Narmadha  UG Student, Department of Computer Science & Engineering, Sri Manakula Vinayagar Engineering College, Puducherry, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT1952140

Keywords:

Wireless Sensor Network, Cyber Physical Systems, Enhanced Grey Wolf Optimization, Swarm Intelligence, Aggregate Signature

Abstract

Wireless sensor networks (WSNs) play a pivotal role in Cyber Physical Systems (CPSs), particularly for operations such as observing the location and monitoring it. To enhance the cyber security in WSN-enabled CPSs, various researchers have proposed a various category of algorithms, inspired by biological phenomena. These algorithm works on the basis of mobility of head node (Mobile Anchor Node). However, these WSNs mobile anchor node are subject to various types of optimization like Grey wolf optimizer (GWO) and Whale optimization Algorithm (WOA). Complexity is one of the limitation of these algorithm and also it is vulnerable to damage, theft, or destruction of sensitive data, in addition to that interference in services also occur in CPSs. To prevent these cyber-attack, we proposed generic bio-inspired model ie., enhanced Grey wolf optimizer path planning called Swarm Intelligence for WSN Cyber security that addresses drawbacks of prior bio-inspired approaches. In this model WSN enabled Cyber Physical Systems use ID-Based Aggregate Signature Scheme to detect the cyber-attack and keep data integrity

References

  1. Z. Fei, B. Li, S. Yang, C. Xing, H. Chen, and L. Hanzo, "A survey of multi-objective optimization in wireless sensor networks: Metrics, algorithms, and open problems," IEEE Communications Surveys Tutorials, vol. 19, no. 1, pp. 550–586, Firstquarter 2017.
  2. L. M. Borges, F. J. Velez, and A. S. Lebres, "Survey on the characterization and classification of wireless sensor network applications," IEEE Communications Surveys Tutorials, vol. 16, no. 4,pp. 1860–1890, Fourthquarter 2014.
  3. H. Karl and A. Willig, Protocols and architectures for wireless sensor networks. Hoboken, NJ: Wiley, May 2005.
  4. A. B. Noel, A. Abdaoui, T. Elfouly, M. H. Ahmed, A. Badawy, and M. S. Shehata, "Structural health monitoring using wireless sensor networks: A comprehensive survey," IEEE Communications Surveys Tutorials, vol. 19, no. 3, pp. 1403–1423, third quarter 2017.
  5. D. N. Sandeep and V. Kumar, "Review on clustering, coverage and connectivity in underwater wireless sensor networks: A communication techniques perspective," IEEE Access, vol. 5, pp. 11 176–11 199, 2017.
  6. A. M. Abu-Mahfouz and G. P. Hancke, "Alwadha localization algorithm: Yet more energy efficient," IEEE Access, vol. 5, pp. 6661–6667, 2017.
  7. Y. S. Chen, D. J. Deng, and C. C. Teng, "Range-based localization algorithm for next generation wireless networks using radical centers," IEEE Access, vol. 4, pp. 2139–2153, 2016.
  8. A. Alomari, W. Phillips, N. Aslam, and F. Comeau, "Dynamic fuzzy-logic based path planning for mobility-assisted localization in wireless sensor networks," Sensors, vol. 17, no. 8, 2017.
  9. S. Halder and A. Ghosal, "A survey on mobile anchor assisted localization techniques in wireless sensor networks," Wireless Networks, vol. 22, no. 7, pp. 2317–2336, 2016
  10. N. A. Alrajeh, M. Bashir, and B. Shams, "Localization techniques in wireless sensor networks," International Journal of DistributedSensor Networks, vol. 9, no. 6, p. 304628, 2013.
  11. G. Han, J. Jiang, C. Zhang, T. Q. Duong, M. Guizani, and G. K. Karagiannidis, "A survey on mobile anchor node assisted localization in wireless sensor networks," IEEE Communications Surveys Tutorials, vol. 18, no. 3, pp. 2220–2243, thirdquarter 2016.
  12. S. Mirjalili, S. M. Mirjalili, and A. Lewis, "Grey wolf optimizer," Advances in Engineering Software, vol. 69, pp. 46 – 61, 2014.
  13. S. Mirjalili and A. Lewis, "The whale optimization algorithm," Advances in Engineering Software, vol. 95, pp. 51 – 67, 2016.
  14. A. Alomari, F. Comeau, W. Phillips, and N. Aslam, "New path planning model for mobile anchor-assisted localization in wireless sensor networks," Wireless Networks, pp. 1–19, 2017.
  15. D. Koutsonikolas, S. M. Das, and Y. C. Hu, "Path planning of mobile landmarks for localization in wireless sensor networks," Comput. Commun., vol. 30, no. 13, pp. 2577–2592, Sep. 2007.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
I. Govindharajn, P. Jeeva, M. Kanimozhi, S. Kodieswari, A. Narmadha, " Expressive and Deployable Swarm Intelligence Based Cybersecurity for Wireless Sensor Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.761-770, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT1952140