Improving Reputation Systems for Wireless Sensor Networks using Genetic Algorithms

被引:0
作者
Bankovic, Zorana [1 ]
Fraga, David [1 ]
Carlos Vallejo, Juan [1 ]
Manuel Moya, Jose [1 ]
机构
[1] Tech Univ Madrid, Dept Elect Engn, Madrid 28040, Spain
来源
GECCO-2011: PROCEEDINGS OF THE 13TH ANNUAL GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE | 2011年
关键词
Wireless sensor networks; reputation system; unsupervised genetic algorithm; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this article we propose to couple reputation systems for wireless sensor networks with a genetic algorithm in order to improve their time of response to adversarial activities. The reputation of each node is assigned by an unsupervised genetic algorithm trained for detecting outliers in the data. The response of the system consists in assigning low reputation values to the compromised nodes cutting them off from the rest of the network. The genetic algorithm uses the feature extraction process that does not capture the properties of the attacks, but rather relies on the existing temporal and spatial redundancy in sensor networks and tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. This solution offers many benefits: scalable solution, fast response to thwart activities, ability to detect unknown attacks, high adaptability, and high ability in detecting and confining attacks. Comparing to the standard clustering algorithms, the benefit of this one is that it is not necessary to assign the number of clusters from the beginning. The solution is also robust to both parameter changes and the presence of large amounts of malicious data in the training and testing datasets.
引用
收藏
页码:1643 / 1650
页数:8
相关论文
共 17 条
[1]   Performance evaluation of density-based clustering methods [J].
Aliguliyev, Ramiz M. .
INFORMATION SCIENCES, 2009, 179 (20) :3583-3602
[2]  
[Anonymous], 2010, INDIAN J SCI TECHNOL
[3]   Peer-to-peer wireless LAN consortia: Economic modeling and architecture [J].
Antoniadis, P ;
Courcoubetis, C ;
Efstathiou, EC ;
Polyzos, GC ;
Strulo, B .
THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, :198-199
[4]  
Bar El H., 2003, INTRO SIDE CHANNEL A
[5]   Trust-based security for wireless ad hoc and sensor networks [J].
Boukerch, A. ;
Xu, L. ;
El-Khatib, K. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2413-2427
[6]  
Goldberg DE., 1989, GENETIC ALGORITHMS S, V13
[7]   Security threats scenarios in trust and reputation models for distributed systems [J].
Gomez Marmol, Felix ;
Martinez Perez, Gregorio .
COMPUTERS & SECURITY, 2009, 28 (07) :545-556
[8]  
Hortos W. S., 2009, P SPIE, V7352
[9]  
Hu YC, 2003, IEEE INFOCOM SER, P1976
[10]   A genetic clustering method for intrusion detection [J].
Liu, YG ;
Chen, KF ;
Liao, XF ;
Zhang, W .
PATTERN RECOGNITION, 2004, 37 (05) :927-942