Prediction of Sybil attack on WSN using Bayesian network and swarm intelligence

被引:4
作者
Muraleedharan, Rajani [1 ]
Ye, Xiang [1 ]
Osadciw, Lisa Ann [1 ]
机构
[1] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
来源
WIRELESS SENSING AND PROCESSING III | 2008年 / 6980卷
关键词
Bayesian network; denial of service; swarm intelligence; Sybil attack; wireless sensor networks;
D O I
10.1117/12.778219
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Security in wireless sensor networks is typically sacrificed or kept minimal due to limited resources such as memory and battery power. Hence, the sensor nodes are prone to Denial-of-service attacks and detecting the threats is crucial in any application. In this paper, the Sybil attack is analyzed and a novel prediction method, combining Bayesian algorithm and Swarm Intelligence (SI) is proposed. Bayesian Networks (BN) is used in representing and reasoning problems, by modeling the elements of uncertainty. The decision from the BN is applied to SI forming an Hybrid Intelligence Scheme (HIS) to re-route the information and disconnecting the malicious nodes in future routes. A performance comparison based on the prediction using HIS vs. Ant System (AS) helps in prioritizing applications where decisions are time-critical.
引用
收藏
页数:10
相关论文
共 50 条
[31]   Reliability Prediction System using Bayesian Network [J].
Imazawa, Kei ;
Katsumura, Y. ;
Kosugi, K. ;
Douwaki, M. .
PROCEEDINGS 18TH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY & QUALITY IN DESIGN, 2012, :6-+
[32]   Prediction of keyword auction using Bayesian Network [J].
Hou, Liwen ;
Wang, Liping ;
Li, Kang .
E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2007, 4655 :169-+
[33]   Information-theoretic approach for secure localization against sybil attack in wireless sensor network [J].
Arindam Giri ;
Subrata Dutta ;
Sarmistha Neogy .
Journal of Ambient Intelligence and Humanized Computing, 2021, 12 :9491-9497
[34]   Sybil Attack Detection in Vehicular Network based on Received Signal Strength [J].
Shrestha, Rakesh ;
Djuraev, Sirojiddin ;
Nam, Seung Yeob .
2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2014, :745-746
[35]   Information-theoretic approach for secure localization against sybil attack in wireless sensor network [J].
Giri, Arindam ;
Dutta, Subrata ;
Neogy, Sarmistha .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (10) :9491-9497
[36]   Study of Swarm Intelligence Algorithms for Optimizing Deep Neural Network for Bitcoin Prediction [J].
Ahamed, S. Aarif ;
Ravi, Chandrasekar .
INTERNATIONAL JOURNAL OF SWARM INTELLIGENCE RESEARCH, 2021, 12 (02) :22-38
[37]   Method of Detecting the Sybil Attack Based on Ranging in Wireless Sensor Network [J].
Ren Xiu-li ;
Yang Wei .
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, :4569-4572
[38]   A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network [J].
Shi, Wei ;
Liu, Sanyang ;
Zhang, Zhaohui .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (09) :3738-3750
[39]   Defense mechanisms against Sybil attack in vehicular ad hoc network [J].
Mohammadi, Mahdiyeh Ali ;
Pouyan, Ali A. .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) :917-936
[40]   Security Analysis for Sybil Attack in Sensor Network Using Compare and Match-Position Verification Method [J].
Sundaram, B. Barani ;
Kedir, Tucha ;
Mishra, Manish Kumar ;
Yesuf, Seid Hassen ;
Tiwari, Shobhit Mani ;
Karthika, P. .
MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 :55-64