Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Authors

Electrical Engineering Department,Tehran University of Central, Tehran, Iran.

Abstract

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks is suggested. The selection based on optimal path by routing using genetic algorithm uses. The proposed optimal paths to transmit data perceived to have chosen and ensures reliable data transmission.

Keywords


[1]
B. Choi, E. Cho, J. Kim, C. Hong, and J. Kim, “A Sinkhole Attack Detection Mechanism for LQI based Mesh Routing in WSN”, Information Networking, ICOIN International Conference on, pp.1-5, Jan 2009.
[2]
V. Katiyar, N. Chand, and S. Soni, “Clustering Algorithms for Heterogeneous Wireless Sensor Network: A Survey”, International Journal of Advanced Networking and Applications, Vol.2, No.4, pp.745–754, 2011.
[3]
J. Kim and T. Cho, “Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function”, Lecture Notes in Computer Science, Vol.4707, pp.637-648, 2007.
[4]
B. Choi, E. Cho, J. Kim, C. Hong, and J. Kim, “A Sinkhole Attack Detection Mechanism for LQI based Mesh Routing in WSN”, Information Networking, ICOIN International Conference on, pp.1-5, Jan 2009.
[5]
H. Deng, X. Sun, B.Wang, and Y. Cao, “Selective Forwarding Attack Detection using Watermark in WSNs”, CCCM 2009. ISECS International Colloquium on, pp.109-113, 2009.
[6]
G. Acs, and L. Buttyan, “Dessiging a Secure Label-Switching Routing Protocol for Wireless Sensor Networks”, Telecommunications Budapest University of Technology and Economics, Hungary, Dec.22, 2008.
[7]
A. Modirkhazen, N. Ethnic, and O. Ibrahim, “Empirical Study on Secure Routing Protocols in Wireless Sensor Networks”, International Journal of Advancements in Computing Technology, Vol.2, No.5, Dec 2010.
[8]
Y. Li, S. Chen, C. Song, Z. Wang, and Y. Dun, “Enhancing Teal-Time Delivery in Wireless Sensor Networks with Two-Hop Information”, IEEE Trans. On Industrial Informatics, Vol.5, No.2, 2009.
[9]
I. Dtojmenovic, “Handbook of Sensor Network: Algorithms and Architectures”, New York: Wiley, 2005.
[10]
J. Hill, R. Szewczyk, A. Woo, S .Hollar, D. Culler, and K. Pister, “System architecture directions for networked sensors”, ACM Sigplan Notices, Vol.35, pp.93-104, 2000.
[11]
I. F. Akyldiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless Sensor Networks: A Survey”, Computer Networks, Vol.38, pp.393-422, 2002.
[12]
R. Khanna, H. Liu, and H. Chen, “Self-Organisation of Sensor Networks Using Genetic Algorithms”, Int. J. Senor Network, Vol.1, NOS. ¾, 2006.
[13]
G. Wenliang, S. Huichang, Y. Jun and Z. Yifei, “Application of Genetic Algorithm in Energy Efficient Routing”, China-Japan Joint Microwave Conference, pp.737-740, 2009.
[14]
L. Guo, and Q. Tang, “An Improved Routing Protocol in WSN with Hybrid Genetic Algorithm”, Second International Conference on Network Security Wireless Communications and Trusted Computing (NSWCTC), Vol.2, pp.289-292, 2010.
[15]
C. Sun, and T.Cho, “Path Selection Method for Reliable Data Transmission in Sensor Networks Using GA”, IJCSNS International Journal of Computer Science and Network Security, Vol.11 No.2, Feb., 2011.
[16]
J. M. Kim and T. H. Cho, “Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function”, Lecture Notes in Computer Science, Vol.4707, pp.637-648, 2007.
[17]
Al-Ghazal, M. Sayed, and A. Kelash, “Routing Optimization Using Genetic Algorithm in Ad Hoc Networks”, The IEEE Symposium on Signal Processing and Information Technology (ISSPIT) Cairo, 2007.
[18]
L. Guo, and Q. Tang, “An Improved Routing Protocol in WSN with Hybrid Genetic Algorithm”, Second International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), Vol.2, pp.289-292, 2010