Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

A Survey on Various Applications of Swarm Intelligence in Wireless Sensor Networks

Author : S.Sushmitha 1 G.Mahalakshmi 2

Date of Publication :7th May 2016

Abstract: Wireless sensor network is susceptible to to various attacks due to the deployment in aggressive environment. Among various types of security threads, low power sensor nodes are affected by the various types of attacks that cause the random drainage of the energy source of sensors. It leads to the expiry of sensor nodes. The denial of sleep attack is the most important type of attack belongs to this category. In this survey, various aspects of swarm based approach for the detection and prevention of denial of sleep attacks in wireless sensor networks are described.

Reference :

    1. S. Qureshi, A. Asar, A. Rehman, and A. Baseer, 2011“Swarm Intelligence based Detection of Malicious Beacon Node for Secure Localization in Wireless Sensor Networks”, Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) 2 (4): 664-672 (ISSN: 2141-7016).
    2. Nidhi, Mrs. Pooja Mittal 2012. “A Swarm Based Approach to Detect Hole In Wireless Sensor Network”, IJCSMS International Journal of Computer Science & Management Studies, Vol. 12, Issue 03, September 2012.
    3. Rhavendra V.Kulkarni Ganesh Kumar, Venayagamoorthy,2010” Particle Swarm Optimization in Wireless Sensor Networks: A Brief Survey” IEEE transaction on Systems.
    4. Tripti Sharma, G.S. Tomar, Brijesh Kumar, Ishaan Berry,2014,” Particle Swarm Optimization based Cluster Head Election Approach for Wireless Sensor Network” International Journal of Smart Device and Appliance Vol.2, No.2 (2014)
    5. N.K. Sreelaja, G.A. Vijayalakshmi Pai,2014” Swarm intelligence based approach for sinkhole attack detection inwireless sensor networks” ,E L S E V I E R
    6. S. Periyanayagi and V. Sumathy, "Swarm Based Defense Technique for Denial-of-Sleep Attacks in Wireless Sensor Networks," International Review on Computers & Software, vol. 8, 2013.
    7. G.Indrani,K.selva kumar” Swarm based Intrusion Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks” International Journal of Computer Applications (0975 – 8887),Volume 50– No.19, July 2012
    8. Periyanayagi and Sumathy,2011” A Swarm Based Defense Technique for Jamming Attacks in Wireless Sensor Networks”, International Journal of Computer Theory and Engineering, Vol. 3, No. 6, December 2011
    9. Fatih Çelik, Ahmet Zengin and Sinan Tuncel,2010” A survey on swarm intelligence based routing protocols in wireless sensor networks” International Journal of the Physical Sciences Vol. 5(14), pp. 2118-2126, 4 November, 2010.
    10. Rajani Muraleedharan and Lisa Ann Osadciw,2003,” Sensor Communication Network Using Swarm Intelligence”,IEEE_2003.
    11. C. Kolias , G. Kambourakis,2011” Swarm intelligence in intrusion detection: A survey” ,E L S E V I E R Sevinc E, Cosar A. An Evolutionary Genetic Algorithm for optimization of Distributed Database Queries, The Computer Journal, 2011;vol.54,Issue 5, pp. 717-725.
    12. Dokeroglu T, Tosun U, Cosar A. Parallel Mutation Operator for the Quadratic Assignment Problem, Proceedings of WIVACE, 2012; Italian Workshop on Artificial Life and Evolutionary Computation.
    13. Sureyya Mutlu, and Guray Yilmaz, “ A Distributed Cooperative Trust Based Intrusion Detection Framework for MANETs”, The Seventh International Conference on Networking and Services(ICNS), pp 292 to 298, 2011
    14. A. Kavoukis and S. Aljareh, "Efficient time synchronized one-time password scheme to provide secure wake-up authentication on wireless sensor networks," arXiv preprint arXiv:1302.1756, 2013
    15. P. Sharma, N. Sharma, and R. Singh, "A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network," International Journal of Computer Applications, vol. 41, pp. 16-21, 2012
    16. T. Bhattasali and R. Chaki, "Lightweight hierarchical model for HWSNET," Networking and Internet Architecture, pp. 1-14, 2011
    17. S. Fouchal, D. Mansouri, L. Mokdad, and M. Iouallalen, "Recursive ‐clustering ‐based approach for denial of service (DoS) attacks in wireless sensors networks," International Journal of Communication Systems, 2013
    18. Abadeh MS, Habibi J. A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection. The ISC International Journal of Information Security 2010; 2(1):33e46
    19. S.Venkatasubramanian, and N.P.Gopalan, “A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET”, International Journal of Computer Applications (IJCA), pp 7-11, 2011.
    20. HyoJin Kim, Ramachandra Bhargav Chitti, and JooSeok Song,“Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile AdHoc Networks”, Journal of Information Processing Systems, Vol.7, No.1, March 2011.
    21. Rizwan Khan, and A. K. Vatsa, “Detection and Control of DDOS Attacks over Reputation and Score Based MANET”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 11, October 2011.
    22. Quan Jia, Kun Sun, and Angelos Stavrou, “ Cap Man: Capability-based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET”, Proceedings of 20th international conference on computer communications and networks (ICCCN), pp 1 – 6, 2011
    23. Vinay Rishiwal, S. Verma, and S. K. Bajpai, “QoS Based Power Aware Routing in MANETs”, International Journal of Computer Theory and Engineering, Vol. 1, No. 1, April 2009.

    1. S. Qureshi, A. Asar, A. Rehman, and A. Baseer, 2011“Swarm Intelligence based Detection of Malicious Beacon Node for Secure Localization in Wireless Sensor Networks”, Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) 2 (4): 664-672 (ISSN: 2141-7016).
    2. Nidhi, Mrs. Pooja Mittal 2012. “A Swarm Based Approach to Detect Hole In Wireless Sensor Network”, IJCSMS International Journal of Computer Science & Management Studies, Vol. 12, Issue 03, September 2012.
    3. Rhavendra V.Kulkarni Ganesh Kumar, Venayagamoorthy,2010” Particle Swarm Optimization in Wireless Sensor Networks: A Brief Survey” IEEE transaction on Systems.
    4. Tripti Sharma, G.S. Tomar, Brijesh Kumar, Ishaan Berry,2014,” Particle Swarm Optimization based Cluster Head Election Approach for Wireless Sensor Network” International Journal of Smart Device and Appliance Vol.2, No.2 (2014)
    5. N.K. Sreelaja, G.A. Vijayalakshmi Pai,2014” Swarm intelligence based approach for sinkhole attack detection inwireless sensor networks” ,E L S E V I E R
    6. S. Periyanayagi and V. Sumathy, "Swarm Based Defense Technique for Denial-of-Sleep Attacks in Wireless Sensor Networks," International Review on Computers & Software, vol. 8, 2013.
    7. G.Indrani,K.selva kumar” Swarm based Intrusion Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks” International Journal of Computer Applications (0975 – 8887),Volume 50– No.19, July 2012
    8. Periyanayagi and Sumathy,2011” A Swarm Based Defense Technique for Jamming Attacks in Wireless Sensor Networks”, International Journal of Computer Theory and Engineering, Vol. 3, No. 6, December 2011
    9. Fatih Çelik, Ahmet Zengin and Sinan Tuncel,2010” A survey on swarm intelligence based routing protocols in wireless sensor networks” International Journal of the Physical Sciences Vol. 5(14), pp. 2118-2126, 4 November, 2010.
    10. Rajani Muraleedharan and Lisa Ann Osadciw,2003,” Sensor Communication Network Using Swarm Intelligence”,IEEE_2003.
    11. C. Kolias , G. Kambourakis,2011” Swarm intelligence in intrusion detection: A survey” ,E L S E V I E R Sevinc E, Cosar A. An Evolutionary Genetic Algorithm for optimization of Distributed Database Queries, The Computer Journal, 2011;vol.54,Issue 5, pp. 717-725.
    12. Dokeroglu T, Tosun U, Cosar A. Parallel Mutation Operator for the Quadratic Assignment Problem, Proceedings of WIVACE, 2012; Italian Workshop on Artificial Life and Evolutionary Computation.
    13. Sureyya Mutlu, and Guray Yilmaz, “ A Distributed Cooperative Trust Based Intrusion Detection Framework for MANETs”, The Seventh International Conference on Networking and Services(ICNS), pp 292 to 298, 2011
    14. A. Kavoukis and S. Aljareh, "Efficient time synchronized one-time password scheme to provide secure wake-up authentication on wireless sensor networks," arXiv preprint arXiv:1302.1756, 2013
    15. P. Sharma, N. Sharma, and R. Singh, "A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network," International Journal of Computer Applications, vol. 41, pp. 16-21, 2012
    16. T. Bhattasali and R. Chaki, "Lightweight hierarchical model for HWSNET," Networking and Internet Architecture, pp. 1-14, 2011
    17. S. Fouchal, D. Mansouri, L. Mokdad, and M. Iouallalen, "Recursive ‐clustering ‐based approach for denial of service (DoS) attacks in wireless sensors networks," International Journal of Communication Systems, 2013
    18. Abadeh MS, Habibi J. A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection. The ISC International Journal of Information Security 2010; 2(1):33e46
    19. S.Venkatasubramanian, and N.P.Gopalan, “A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET”, International Journal of Computer Applications (IJCA), pp 7-11, 2011.
    20. HyoJin Kim, Ramachandra Bhargav Chitti, and JooSeok Song,“Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile AdHoc Networks”, Journal of Information Processing Systems, Vol.7, No.1, March 2011.
    21. Rizwan Khan, and A. K. Vatsa, “Detection and Control of DDOS Attacks over Reputation and Score Based MANET”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 11, October 2011.
    22. Quan Jia, Kun Sun, and Angelos Stavrou, “ Cap Man: Capability-based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET”, Proceedings of 20th international conference on computer communications and networks (ICCCN), pp 1 – 6, 2011
    23. Vinay Rishiwal, S. Verma, and S. K. Bajpai, “QoS Based Power Aware Routing in MANETs”, International Journal of Computer Theory and Engineering, Vol. 1, No. 1, April 2009.

Recent Article