- -

Web spider defense technique in wireless sensor networks

RiuNet: Repositorio Institucional de la Universidad Politécnica de Valencia

Compartir/Enviar a

Citas

Estadísticas

  • Estadisticas de Uso

Web spider defense technique in wireless sensor networks

Mostrar el registro sencillo del ítem

Ficheros en el ítem

dc.contributor.author Cánovas Solbes, Alejandro es_ES
dc.contributor.author Lloret, Jaime es_ES
dc.contributor.author Macias Lopez, Elsa Maria es_ES
dc.contributor.author Suarez Sarmiento, Alvaro es_ES
dc.date.accessioned 2015-05-14T14:07:51Z
dc.date.available 2015-05-14T14:07:51Z
dc.date.issued 2014
dc.identifier.issn 1550-1329
dc.identifier.uri http://hdl.handle.net/10251/50250
dc.description.abstract Wireless sensor networks (WSNs) are currently widely used in many environments. Some of them gather many critical data, which should be protected from intruders. Generally, when an intruder is detected in the WSN, its connection is immediately stopped. But this way does not let the network administrator gather information about the attacker and/or its purposes. In this paper, we present a bioinspired system that uses the procedure taken by the web spider when it wants to catch its prey. We will explain how all steps performed by the web spider are included in our system and we will detail the algorithm and protocol procedure. A real test bench has been implemented in order to validate our system. It shows the performance for different response times, the CPU and RAM consumption, and the average and maximum values for ping and tracert time responses using constant delay and exponential jitter. es_ES
dc.description.sponsorship This work has been partially supported by the "Ministerio de Ciencia e Innovacion", through the "Plan Nacional de I+D+i 2008-2011" in the "Subprograma de Proyectos de Investigacion Fundamental", Project TEC2011-27516. en_EN
dc.language Inglés es_ES
dc.publisher Hindawi Publishing Corporation es_ES
dc.relation.ispartof International Journal of Distributed Sensor Networks es_ES
dc.rights Reconocimiento (by) es_ES
dc.subject Mechanisms es_ES
dc.subject Principles es_ES
dc.subject.classification INGENIERIA TELEMATICA es_ES
dc.title Web spider defense technique in wireless sensor networks es_ES
dc.type Artículo es_ES
dc.identifier.doi 10.1155/2014/348606
dc.relation.projectID info:eu-repo/grantAgreement/MICINN//TEC2011-27516/ES/RED COGNITIVA BASADA EN GRUPOS DE SENSORES COLABORATIVOS PARA EL SENSADO Y MONITOZACION DEL ENTORNO ACUATICO/ es_ES
dc.rights.accessRights Abierto es_ES
dc.contributor.affiliation Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions es_ES
dc.contributor.affiliation Universitat Politècnica de València. Instituto de Investigación para la Gestión Integral de Zonas Costeras - Institut d'Investigació per a la Gestió Integral de Zones Costaneres es_ES
dc.description.bibliographicCitation Cánovas Solbes, A.; Lloret, J.; Macias Lopez, EM.; Suarez Sarmiento, A. (2014). Web spider defense technique in wireless sensor networks. International Journal of Distributed Sensor Networks. 2014:1-7. https://doi.org/10.1155/2014/348606 es_ES
dc.description.accrualMethod S es_ES
dc.relation.publisherversion http://dx.doi.org/10.1155/2014/348606 es_ES
dc.description.upvformatpinicio 1 es_ES
dc.description.upvformatpfin 7 es_ES
dc.type.version info:eu-repo/semantics/publishedVersion es_ES
dc.description.volume 2014 es_ES
dc.relation.senia 287535
dc.contributor.funder Ministerio de Ciencia e Innovación es_ES
dc.description.references Bri, D., Garcia, M., Lloret, J., & Dini, P. (2009). Real Deployments of Wireless Sensor Networks. 2009 Third International Conference on Sensor Technologies and Applications. doi:10.1109/sensorcomm.2009.69 es_ES
dc.description.references Sendra, S., Lloret, J., Garcia, M., & Toledo, J. F. (2011). Power Saving and Energy Optimization Techniques for Wireless Sensor Neworks (Invited Paper). Journal of Communications, 6(6). doi:10.4304/jcm.6.6.439-459 es_ES
dc.description.references Xie, M., Han, S., Tian, B., & Parvin, S. (2011). Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, 34(4), 1302-1325. doi:10.1016/j.jnca.2011.03.004 es_ES
dc.description.references Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867-880. doi:10.1016/j.jnca.2011.03.005 es_ES
dc.description.references Zhu, W. T., Zhou, J., Deng, R. H., & Bao, F. (2012). Detecting node replication attacks in wireless sensor networks: A survey. Journal of Network and Computer Applications, 35(3), 1022-1034. doi:10.1016/j.jnca.2012.01.002 es_ES
dc.description.references Maleh, Y., & Ezzati, A. (2013). A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Network. International Journal of Wireless & Mobile Networks, 5(6), 79-90. doi:10.5121/ijwmn.2013.5606 es_ES
dc.description.references Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion Detection Systems in Wireless Sensor Networks: A Review. International Journal of Distributed Sensor Networks, 9(5), 167575. doi:10.1155/2013/167575 es_ES
dc.description.references Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5), 56-63. doi:10.1109/mwc.2007.4396943 es_ES
dc.description.references Fatema, N., & Brad, R. (2013). Attacks and Counterattacks on Wireless Sensor Networks. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 4(6), 1-15. doi:10.5121/ijasuc.2013.4601 es_ES
dc.description.references Ankala, R. P., Kavitha, D., & Haritha, D. (2011). MOBILE AGENT BASED ROUTING in MANETS –ATTACKS & DEFENCES. Network Protocols and Algorithms, 3(4). doi:10.5296/npa.v3i4.1351 es_ES
dc.description.references Hylsberg Jacobsen, R., Zhang, Q., & Skjødeberg Toftegaard, T. (2011). Bioinspired Principles for Large-Scale Networked Sensor Systems: An Overview. Sensors, 11(4), 4137-4151. doi:10.3390/s110404137 es_ES
dc.description.references Kofahi, N. (2013). An Empirical Study to Compare the Performance of some Symmetric and Asymmetric Ciphers. International Journal of Security and Its Applications, 7(5), 1-16. doi:10.14257/ijsia.2013.7.5.01 es_ES
dc.description.references Sisodia, M. S., & Raghuwanshi, V. (2011). Anomaly Base Network Intrusion Detection by Using Random Decision Tree and Random Projection: A Fast Network Intrusion Detection Technique. Network Protocols and Algorithms, 3(4). doi:10.5296/npa.v3i4.1342 es_ES
dc.description.references Zhijie, H., & Ruchuang, W. (2012). Intrusion Detection for Wireless Sensor Network Based on Traffic Prediction Model. Physics Procedia, 25, 2072-2080. doi:10.1016/j.phpro.2012.03.352 es_ES
dc.description.references Al-Gharabally, N., El-Sayed, N., Al-Mulla, S., & Ahmad, I. (2009). Wireless honeypots. Proceedings of the 2009 conference on Information Science, Technology and Applications - ISTA ’09. doi:10.1145/1551950.1551969 es_ES
dc.description.references Gopinath V.Success analysis of deception in wireless sensor networks [M.S. thesis]2010Oklahoma State University es_ES
dc.description.references Zhongshan Zhang, Keping Long, Jianping Wang, & Dressler, F. (2014). On Swarm Intelligence Inspired Self-Organized Networking: Its Bionic Mechanisms, Designing Principles and Optimization Approaches. IEEE Communications Surveys & Tutorials, 16(1), 513-537. doi:10.1109/surv.2013.062613.00014 es_ES
dc.description.references Rathore, H., & Jha, S. (2013). Bio-inspired machine learning based Wireless Sensor Network security. 2013 World Congress on Nature and Biologically Inspired Computing. doi:10.1109/nabic.2013.6617852 es_ES
dc.description.references Alrajeh, N. A., & Lloret, J. (2013). Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks. International Journal of Distributed Sensor Networks, 9(10), 351047. doi:10.1155/2013/351047 es_ES
dc.description.references Amirkolaei M. K.Enhancing bio-inspired intrusion response in Ad-hoc networks [Ph.D. thesis]August 2013Edinburgh, UKEdinburgh Napier Universityhttp://researchrepository.napier.ac.uk/6533/ es_ES
dc.description.references Muraleedharan, R., & Osadciw, L. A. (2009). An intrusion detection framework for Sensor Networks using Honeypot and Swarm Intelligence. Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. doi:10.4108/icst.mobiquitous2009.7084 es_ES
dc.description.references Hortos, W. S. (2012). Bio-inspired, cross-layer protocol design for intrusion detection and identification in wireless sensor networks. 37th Annual IEEE Conference on Local Computer Networks -- Workshops. doi:10.1109/lcnw.2012.6424040 es_ES
dc.description.references Benahmed, K., Merabti, M., & Haffaf, H. (2012). Inspired Social Spider Behavior for Secure Wireless Sensor Networks. International Journal of Mobile Computing and Multimedia Communications, 4(4), 1-10. doi:10.4018/jmcmc.2012100101 es_ES
dc.description.references Herberstein, M. E. (Ed.). (2009). Spider Behaviour. doi:10.1017/cbo9780511974496 es_ES
dc.description.references Ficco, M. (2010). Achieving Security by Intrusion-Tolerance Based on Event Correlation. Network Protocols and Algorithms, 2(3). doi:10.5296/npa.v2i3.420 es_ES


Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem