Title :
Bio-inspired, cross-layer protocol design for intrusion detection and identification in wireless sensor networks
Author_Institution :
Commun. Eng. Res. & Technol. (ACERT), Orlando, FL, USA
Abstract :
Published studies have focused on the application of one bio-inspired or evolutionary computational method to the functions of a single protocol layer in a wireless ad hoc sensor network (WSN). In a novel departure from previous work, the cross-layer approach to WSN protocol design suggests applying a bio-inspired evolutionary computational method to the functions of each protocol layer to improve the intrusion detection identification (IDID) performance of a WSN cross-layer design beyond that of a single method assigned to only one layer´s functions. A cross-layer design, embedding genetic algorithms, anti-phase synchronization, ant colony optimization, and a trust model based on quantized data reputation at the physical (PHY), medium access control (MAC), network, and application layers, respectively, is constructed. Simulation results demonstrate synergies among the bio-inspired methods of the proposed baseline design improve overall IDID performance of networks over that of a single computational method.
Keywords :
access protocols; ad hoc networks; ant colony optimisation; computer network performance evaluation; computer network security; genetic algorithms; synchronisation; wireless sensor networks; IDID performance; WSN cross-layer design; WSN protocol design; ant colony optimization; antiphase synchronization; application layers; baseline design; bio-inspired cross-layer protocol design; bio-inspired evolutionary computational method; genetic algorithms; intrusion detection identification performance; physical medium access control; quantized data reputation; single protocol layer; trust model; wireless ad hoc sensor network; Clustering algorithms; Intrusion detection; OFDM; Protocols; Support vector machines; Uncertainty; Wireless sensor networks; Ant colony optimization (ACO); anti-phase synchronization; artificial neural network (ANN); cross layer design; genetic algorithm (GA); intrusion detection; quantified trust models; wireless sensor networks;
Conference_Titel :
Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on
Conference_Location :
Clearwater, FL
Print_ISBN :
978-1-4673-2130-3
DOI :
10.1109/LCNW.2012.6424040