Expressive and Deployable Swarm Intelligence Based Cybersecurity for Wireless Sensor Network
-
Published:2019-03-11
Issue:
Volume:
Page:761-770
-
ISSN:2456-3307
-
Container-title:International Journal of Scientific Research in Computer Science, Engineering and Information Technology
-
language:en
-
Short-container-title:IJSRCSEIT
Author:
Govindharajn I.1, Jeeva P.2, Kanimozhi M.2, Kodieswari S.2, Narmadha A.2
Affiliation:
1. Associate Professor, Department of Computer Science & Engineering, Sri Manakula Vinayagar Engineering College, Puducherry, Tamil Nadu, India 2. UG Student, Department of Computer Science & Engineering, Sri Manakula Vinayagar Engineering College, Puducherry, Tamil Nadu, India
Abstract
Wireless sensor networks (WSNs) play a pivotal role in Cyber Physical Systems (CPSs), particularly for operations such as observing the location and monitoring it. To enhance the cyber security in WSN-enabled CPSs, various researchers have proposed a various category of algorithms, inspired by biological phenomena. These algorithm works on the basis of mobility of head node (Mobile Anchor Node). However, these WSNs mobile anchor node are subject to various types of optimization like Grey wolf optimizer (GWO) and Whale optimization Algorithm (WOA). Complexity is one of the limitation of these algorithm and also it is vulnerable to damage, theft, or destruction of sensitive data, in addition to that interference in services also occur in CPSs. To prevent these cyber-attack, we proposed generic bio-inspired model ie., enhanced Grey wolf optimizer path planning called Swarm Intelligence for WSN Cyber security that addresses drawbacks of prior bio-inspired approaches. In this model WSN enabled Cyber Physical Systems use ID-Based Aggregate Signature Scheme to detect the cyber-attack and keep data integrity
Publisher
Technoscience Academy
Reference15 articles.
1. Z. Fei, B. Li, S. Yang, C. Xing, H. Chen, and L. Hanzo, "A survey of multi-objective optimization in wireless sensor networks: Metrics, algorithms, and open problems," IEEE Communications Surveys Tutorials, vol. 19, no. 1, pp. 550–586, Firstquarter 2017. 2. L. M. Borges, F. J. Velez, and A. S. Lebres, "Survey on the characterization and classification of wireless sensor network applications," IEEE Communications Surveys Tutorials, vol. 16, no. 4,pp. 1860–1890, Fourthquarter 2014. 3. H. Karl and A. Willig, Protocols and architectures for wireless sensor networks. Hoboken, NJ: Wiley, May 2005. 4. A. B. Noel, A. Abdaoui, T. Elfouly, M. H. Ahmed, A. Badawy, and M. S. Shehata, "Structural health monitoring using wireless sensor networks: A comprehensive survey," IEEE Communications Surveys Tutorials, vol. 19, no. 3, pp. 1403–1423, third quarter 2017. 5. D. N. Sandeep and V. Kumar, "Review on clustering, coverage and connectivity in underwater wireless sensor networks: A communication techniques perspective," IEEE Access, vol. 5, pp. 11 176–11 199, 2017.
|
|