skip to main content
10.1145/2001576.2001798acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
research-article

Improving reputation systems for wireless sensor networks using genetic algorithms

Published:12 July 2011Publication History

ABSTRACT

In this article we propose to couple reputation systems for wireless sensor networks with a genetic algorithm in order to improve their time of response to adversarial activities. The reputation of each node is assigned by an unsupervised genetic algorithm trained for detecting outliers in the data. The response of the system consists in assigning low reputation values to the compromised nodes cutting them off from the rest of the network. The genetic algorithm uses the feature extraction process that does not capture the properties of the attacks, but rather relies on the existing temporal and spatial redundancy in sensor networks and tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. This solution offers many benefits: scalable solution, fast response to thwart activities, ability to detect unknown attacks, high adaptability, and high ability in detecting and confining attacks. Comparing to the standard clustering algorithms, the benefit of this one is that it is not necessary to assign the number of clusters from the beginning. The solution is also robust to both parameter changes and the presence of large amounts of malicious data in the training and testing datasets.

References

  1. Mármol, F. and Pérez, G. Security threats scenarios in trust and reputation models for distributed systems, Computers & Security 28 (2009) 545--556.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Aliguliyev, R. M. Performance evaluation of density-based clustering methods, Inf. Sciences 179 (2009) 3583 - 3602. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Moya, J. M. et al. Improving security for SCADA sensor networks with reputation systems and Self-Organizing maps, Sensors 9 (2009) 9380--9397.Google ScholarGoogle ScholarCross RefCross Ref
  4. Boukerch, A.; Xu, L.; EL-Khatib, K. Trust-based Security for Wireless Ad Hoc and Sensor Networks. Comput. Commun. 2007, 30, 2413--2427. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Papaioannou, T.G.; Stamoulis, G.D. Effective use of reputation of peer-to-peer environments. In Proc. of IEEE/ACM CCGRID 2004, GP2PC workshop. IEEE Comp. Soc: Chicago, IL, USA, April 19--22, 2004; pp. 259--268. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Antoniadis, P.; Courcoubetis, C.; Efstathiou, E.; Polyzos, G.; Strulo, B. Peer-to-Peer wireless LAN consortia: Economic modeling and architecture. In Proc. of the Third IEEE Int.l Conf. on Peer-to-Peer Comp., IEEE Comp. Soc.: Linköping, Sweeden, Sept. 1--3, 2003; pp. 198--199. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hu Y, Perrig A, Johnson D. Packet leashes: a defense against wormhole attacks in wireless networks. Proc. of 22nd annual joint conference of the IEEE computer and communications societies (INFOCOM 2003 ). vol. 3, 2003. pp. 1976--86.Google ScholarGoogle ScholarCross RefCross Ref
  8. Bar El, H. Introduction to Side Channel Attacks. Discretix Technologies Ltd., 2003.Google ScholarGoogle Scholar
  9. Mukhopadhyay D, Saha I. Location verification based defense against sybil attack in sensor networks. In: Distr. comp. and networking. Springer, 2006. p. 509--521. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Liu, Y.G., Chen, K.F., Liao, X.F., Zhang ,W. A genetic clustering method for intrusion detection. Pattern Recognition, 37(5), 927--942. (2004)Google ScholarGoogle ScholarCross RefCross Ref
  11. Renjit, J. A. and K. L. Shunmuganathan, Distributed and cooperative multi-agent based intrusion detection system, Indian Journal of Science and Technology 3(10): 1070--1074. (2010).Google ScholarGoogle Scholar
  12. Hortos, W. S. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks, Proc. SPIE 7352, pp. 73520J, 2009.Google ScholarGoogle Scholar
  13. Renjit, J. A. and K. L. Shunmuganathan. Distributed and cooperative multi-agent based intrusion detection system, Indian Journal of Science and Technology 3(10): 1070--1074. (2010).Google ScholarGoogle Scholar
  14. Roosta, T. G. Attacks and Defenses on Ubiquitous Sensor Networks, Ph. D. Dissertation, Univ.of California at Berkeley, 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Rieck, K.; Laskov, P. Linear Time Computation of Similarity for Sequential Data. J. Mach. Learn. Res. 2008, 9, 23--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Muñoz, A.; Muruzábal. J. Self-Organizing Maps for Outlier Detection. Neurocomputing 18(1--3), 1998, 33--60Google ScholarGoogle Scholar
  17. Goldberg, D. E. Genetic algorithms for search, optimization, and machine learning. 1st Ed. Addison-Wesley Longman Publishing Co., Inc.: Boston, MA, USA, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mitra, S.; Acharya, T. Data Mining: Multimedia, Soft Computing, and Bioinformatics; John Wiley & Sons, Inc.: Hoboken, New Jersey, USA, 2003; pp. 257--269.Google ScholarGoogle Scholar

Index Terms

  1. Improving reputation systems for wireless sensor networks using genetic algorithms

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          GECCO '11: Proceedings of the 13th annual conference on Genetic and evolutionary computation
          July 2011
          2140 pages
          ISBN:9781450305570
          DOI:10.1145/2001576

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 12 July 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,669of4,410submissions,38%

          Upcoming Conference

          GECCO '24
          Genetic and Evolutionary Computation Conference
          July 14 - 18, 2024
          Melbourne , VIC , Australia
        • Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader