International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.9, No.12, Dec. 2017

Monitoring of Military Base Station using Flooding and ACO Technique: An Efficient Approach

Full Text (PDF, 523KB), PP.36-44

Views:188   Downloads:5


Abdus Samad, Mohammed Shuaib, Mohd Rizwan Beg

Index Terms

Bait agent;Master agent;Intrusion detection;Flooding Ant Colony;Intrusion detection;DoS attack


Rapid development of Wireless sensor network led to applications ranging from industry to military fields. These sensors are deployed in the military base station such as battlefield surveillances. The important issues like security & DoS attacks play crucial role for wireless sensor network. Due to the limitations of resources, traditional security scheme cannot be employed efficiently. Therefore, designing a framework that can operate securely using smart intelligence technique is the best option. In this paper, an efficient way of detecting an intrusion using Flooding and Ant colony is proposed. The flooding technique enables the master agents to track the activity of intruder tampering the part of the network. The ACO identifies the path followed by the nodes and also the intruder, who wants to jam the whole wireless sensor network. The architecture strategically enables the Bait agents to detect the intruders threatening the network. The proposed framework is designed for the military station. It helps the base station to detect the intrusion and decide whether the activity is normal or terrestrial and send the signal to the nearest missile station situated near the intrusion location and destroy it in minimum time. The process of detecting the intrusion earlier not only helps to learn future attacks, but also a defense counter measures.

Cite This Paper

Abdus Samad, Mohammed Shuaib, Mohd Rizwan Beg,"Monitoring of Military Base Station using Flooding and ACO Technique: An Efficient Approach", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.12, pp.36-44, 2017.DOI: 10.5815/ijcnis.2017.12.05


[1]R. Muraleedharan and L. A. Osadciw, “An Intrusion Detection Framework for Sensor Networks Using Honeypot and Swarm Intelligence,” 6th Annual International Conf. on Mobile and Ubiquitous Systems: Computing, Networking and Services, Toronto, pp. 1-2, 13-16, July 2009.  

[2]I. Melgar, J. Fombellida, J. Seijas and F.Quintana, “Cooperation and competition based on Free Market in Swarm System architectures for Air Defense,” IECON 09, pp. 3359-3364, November 2009.

[3]Rajani Muraleedharan and Lisa Ann Osadciw, “An Intrusion Detection framework for Sensor Networks using Ant Colony,” ACSSC 2009, Pacific Grove, pp. 275-278, 1-4 Nov. 2009.

[4]M. Jamshidi, Systems of Systems Engineering: Principles and Applications, CRC Press, FL USA 2008.

[5]Wood A.D., Stankovic. J. A., “Denial of Service in Sensor Networks,” IEEE Computer, vol. 35, Issue: 10, Oct. 2002.

[6]Y. M. Yussoff, H. Hashim, R. Rosli, and M. Dani Baba, “A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks,” International Symposium on Robotics and Intelligent Sensors, vol. 41, Issue. 4, pp. 580-587, April 2012. 

[7]Medium Extended Air Defense System (MEADS) 21st Century Air and Missile Defense, 2008.

[8]Vijayasarathy, R., Ravindran, B., and Raghavan, S.V., “A system approach to network modeling for DoS detection Using a Naive Bayesian classifier,” IEEE COMSNETS, 2011, Bangalore, pp. 1-10, Jan. 2011.

[9]X. Ouyang, B. Tian, Q. Li, J. Zhang, Z. Hu, and Y. Xin, “A Novel Framework of Defense System Against DoS Attacks in Wireless Sensor Networks,” WICOM 2007, Wuhan, pp. 1-5, Sept. 2011.

[10]A. D. Wood, John A. Stankovic, and S. H. Son, “JAM: A Jammed-Area Mapping Service for Sensor Networks,” Proceedings of the 24th IEEE International Real-Time Systems Symposium, 2003, pp. 286-297.

[11]A. Mittal, A. K. Shrivastava, and M. Manoria, “A Review of DDoS Attack and its Countermeasures in TCP Based Networks,” International Journal of Computer Science & Engineering Survey (IJCSES) vol. 2, no. 4, pp. 178-187,  November 2011. 

[12]H. Beitollahi and G. Deconinck, “Tackling Application-layer DDoS Attacks,” Procedia Computer Science, vol. 10, pp. 432-441, 2012. 

[13]H. Chen, T. Gaska, Yu Chen, and D. H. Summerville, “An optimized reconfigurable power spectral density converter for real-time shrew DDoS attacks detection,” Computers and Electrical Engineering, vol. 39, pp. 295-308, 2013.

[14]M. Aamir and M. A. Zaidi, “DDoS Attack and Defense: Review of Some Traditional and Current Techniques,” Interdisciplinary Information Sciences, vol. 19, no. 2, pp. 173–200, 2013.

[15]M. J. Hashmi, M. Saxena, and R. Saini, “Classification of DDoS Attacks and their Defense Techniques using Intrusion Prevention System,” International Journal of Computer Science & Communication Networks, vol. 2, no. 5, pp. 607-614, 2012.

[16]M. H. Bhuyan, D.K. Bhattacharyya, and J. K. Kalita, “An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection,” Pattern Recognition Letters, vol. 51, pp.1-7, 2015. 

[17]T. Spyridopoulos, G. Karanikas, T. Tryfonas, and G. Oikonomou, “A game theoretic defence framework against DoS/DDoS cyber-attacks,” Cryptography Group, Faculty of Engineering, University of Bristol, Merchant Ventures Building, Woodland Road, Clifton BS8 1UB, UK. 

[18]Wei Zhou, Weijia Jia, Sheng Wen, Yang Xiang and Wanlei Zhou, “Detection and defense of application-layer DDoS attacks in backbone web traffic,” Future generation Computer System, vol. 38, pp. 36-46, September 2014.

[19]T. Thenmozhi and R.M. Soma, “Towards an approach for improved security in Wireless Sensor Networks,” ICCCNT’ 12, Coimbtore, India, pp. 26 -28, July 2012. 

[20]D. J. Thuente and M. Acharya, “Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks,” in Proceedings of Military Communications Conf. Atlantic City, USA, (MILCOM), 2006. 

[21]W. Xu et al., “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,” Proc. 11th Ann. Int’l Conf. Mobile Computing and Networking, ACM Press,  pp. 46–57, 2005.

[22]T. Kavitha and D. Sridharan, “Security vulnerabilities in wireless sensor networks: a survey,” Journal of Information Assurance & Security, vol. 5, pp. 31-44, 2010. 

[23]D. Raymond et al., “Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols,” Proc. 7th Ann. IEEE Systems, Man, and Cybernetics Information Assurance Workshop, IEEE Press, pp. 297-304, 2006.

[24]Padmavathi and G. Shanmugapriya, “A survey of attacks, security mechanisms and challenges in wireless sensor networks,” International Journal of Computer Science and Information Security (IJCSIS): vol. 4, no.1 & 2, Dec. 2009.

[25]Karlof. C and Wagner. D, “Secure routing in wireless sensor networks: Attacks and countermeasures,” In Proc. of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, May 11, 2003. 

[26]E. L. Caballero, “Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks-The routing problem,” TKK T-110.5290, Seminar on Network Security, 2006. 

[27]J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless Sensor Network Security: A survey,” Security in distributed, grid, and pervasive computing, Auer Bach Publications, CRC Press, ISBN 0-849-37921-0, 2006. 

[28]T. Petrovi? and M. ?agar, “Security in Distributed Wireless Sensor Networks,” In Proc. of the 35th International Convention MIPRO, Croatia, May 2012. 

[29]Y. Zhou, Y. Fang and, Y. Zhang, “Securing Wireless Sensor Networks: A Survey,” IEEE Communications Surveys & Tutorials,” vol. 10, issue 3, pp. 6-28, 2008. 

[30]A. Abduvaliyev, Al-Sakib K. Pathan, J. Zhou, R. Roman and, W. C. Wong, “On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks,” IEEE Communication Surveys and Tutorials, July 2013. 

[31]ZHANG Yi-ying, LI Xiang-zhen and, LIU Yuan-an, “The detection and defence of DoS attack for wireless sensor network,” The Journal of China Universities of Post and Telecommunication, pp. 52-56, Oct. 2012.

[32]M. Sharawi, I. A. Saroit, H. Mahdy, and E. Emary, “Routing Wireless Sensor Networks Based On Soft Computing Paradigms: Survey,” International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), vol. 2, no. 4, August 2013.

[33]Z. Ali and W. Shahzad, “Analysis of Routing Protocols in AD HOC and Sensor Wireless Networks Based on Swarm Intelligence,” International Journal of Networks and Communications, vol. 3, no. 1, pp. 1-11, 2013.

[34]S. U. Parvatkar and D.V. Gore, “An Ant Colony Optimization Algorithm for maximizing the lifetime of Heterogeneous Wireless Sensor Network,” International Journal of Current Engineering and Technology, vol. 4, no. 3, June 2014.