Intrusion detection using ant colony approach in wireless sensor networks

  • Authors

    • Jayashree Agarkhed
    • Gauri Kalnoor
    2018-09-22
    https://doi.org/10.14419/ijet.v7i4.5.21180
  • Intruder Attacks, Lightweight Intrusion Detection, Multi Agent System, Ant Colony, WSN, Multi Sensors.
  • Design of an intrusion detection system in the sensor network to improve the behavior of the network is the major challenge is theVariety of intrusion detection mechanisms are being used now a days, to provide security in Wireless Sensor networks (WSN). Since WSN works with set of tiny nodes called as sensor nodes, there are high chances of intrusions for malicious attacks. WSN is deployed in medium open to many users wherever possible. A multiple sensing environment of WSN consists of sensors which acts as agents called as multi agents system for detecting an intruder. Ant colony is an effective approach where each agent communicate with each other for updating the information of intruder to the colony administration. The multi agents based system is best phenomenon suitable for optimization of ant colony. In this approach, the ants form a colony where it goes for search continuously until an intruder is found and once searched, it returns back with the best shortest path available with path traces stored in its database for its future reference. An optimized multi agent approach using ant colony is proposed for detection of lightweight intruders for WSN to protect against harmful malicious attacks.

     

     

  • References

    1. [1] J. Han and M. Kamber, (2011) "Data Mining:Concepts and Techniques Slides for Textbook — Chapter 7 " Intelligent Database Systems Research Lab School of Computing Science Simon Fraser University, Canada ,October 15.

      [2] Md. S. Abadeh, J. Habibi, (2010) "A Hybridization of Evolutionary Fuzzy Systems and Ant Colony Optimization for Intrusion Detection", Volume 2, Number 1 (pp. 33-46), Department of Computer Engineering, Sharif University of Technology, Tehran, Iran.

      [3] Y. Shi, ;( et.al.), (2011) “Optimization Based Data Mining:Theory and Applications" Chengdu, China, Springer- Verlag London Limited, pp 18-134.

      [4] M. Glick, A. Klon, P. Acklin, and J. Davies, (2011) "Enrichment of Extremely Noisy High-Throughput Screening Data Using a Naïve Bayes Classifier", Journal of biomolecular Screening, Published by:http://www.sagepublications.com, in August 6.

      [5] LK. Behera and A. Sasidharan, (2011) "Ant Colony Optimization for Co-operation in Robotic Swarms", Pelagia Research Library Advances in Applied Science Research, 2 (3): 476-482.

      [6] HA. Zurba T. Landolsi, Md. Hassan and F. Abdelaziz, (2011), "On the Suitability of Using Ant Colony Optimization for Routing Multimedia Content over Wireless Sensor Networks", International journal on applications of graph theory in wireless ad hoc networks and sensor networks Vol.3, No.2, June.

      [7] Mei-Ling Shyu and Varsha Sainani, ―A Multiagent-based Intrusion Detection System with the Support of Multi-Class Supervised Classification.

      [8] Marco Dorigo and Thomas Stützle ―Ant Colony Optimization

      [9] T. Singh, (2010) "Thesis work on: Ant Colony Optimization (ACO) based Intrusion Detection System" CSE dept Thapar University, patiala, India.

      [10] Vijay Srinivasan, John Stankovic, Kamin Whitehouse,â€Using Height Sensors for Biometric Identification in Multi-resident Homesâ€, Pervasive Computing, eighth International Conference, Pervasive 2010, pp. 337-354, Helsinki, Finland, 2010.

      [11] A.P.N Fahmi, “Hey Home, Open Your Door, I'm Back! Authentication System using Ear Biometrics for Smart Home, “International Journal of Smart Home, Vol. 7, No. 1, 2013.

      [12] M. Saxena, “Security in Wireless Sensor Networks: A Layer-based Classification,†Department of Computer Science, Purdue University, 2011.

      [13] Shio Kumar Singh, M.P. Singh, and D.K. Singh, "Performance Evaluation and Comparison of Energyefficient Routing Protocols for Wireless Sensor Network", Global Journal of Computer Application and Technology (GJCAT), Jan. 2011, vol. 1, no. 1, pp. 57-65.

      [14] Swati Bartariya, Ashutosh Rastogi, and Security in Wireless Sensor Networks: Attacks and Solutions, IJARCCE, Vol.5, Issue 3, March 2016.

      [15] Rajevv Arya, S.C. Sharma, Analysis and optimization of energy of sensor node using ACO in wireless sensor network, Science direct, 2015.

      [16] Kamaldeep Kaur, Parneet Kaur, Er. Sharanjit Singh, Wireless Sensor Network: Architecture, Design Issues and Applications, IJSER, Volume 2, Issue 11, November 2014.

      [17] Rodrigo Roman, Jianying Zhou, and Javier Lopez, “Applying Intrusion Detection Systems to Wireless Sensor Networksâ€.

      [18] S.V. Sheela and P.A Vijaya, “Iris Recognition Methods - Survey†International Journal of Computer Applications, Vol. 3, No.5. pp. 19 25, June 2010.

  • Downloads

  • How to Cite

    Agarkhed, J., & Kalnoor, G. (2018). Intrusion detection using ant colony approach in wireless sensor networks. International Journal of Engineering & Technology, 7(4.5), 657-661. https://doi.org/10.14419/ijet.v7i4.5.21180