16 May 2012 Quality-of-service sensitivity to bio-inspired/evolutionary computational methods for intrusion detection in wireless ad hoc multimedia sensor networks
Author Affiliations +
Proceedings Volume 8402, Evolutionary and Bio-Inspired Computation: Theory and Applications VI; 84020F (2012); doi: 10.1117/12.920888
Event: SPIE Defense, Security, and Sensing, 2012, Baltimore, Maryland, United States
Abstract
In the author's previous work, a cross-layer protocol approach to wireless sensor network (WSN) intrusion detection an identification is created with multiple bio-inspired/evolutionary computational methods applied to the functions of the protocol layers, a single method to each layer, to improve the intrusion-detection performance of the protocol over that of one method applied to only a single layer's functions. The WSN cross-layer protocol design embeds GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layer, respectively. The construct neglects to assess the net effect of the combined bioinspired methods on the quality-of-service (QoS) performance for "normal" data streams, that is, streams without intrusions. Analytic expressions of throughput, delay, and jitter, coupled with simulation results for WSNs free of intrusion attacks, are the basis for sensitivity analyses of QoS metrics for normal traffic to the bio-inspired methods.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
William S. Hortos, "Quality-of-service sensitivity to bio-inspired/evolutionary computational methods for intrusion detection in wireless ad hoc multimedia sensor networks", Proc. SPIE 8402, Evolutionary and Bio-Inspired Computation: Theory and Applications VI, 84020F (16 May 2012); doi: 10.1117/12.920888; https://doi.org/10.1117/12.920888
PROCEEDINGS
15 PAGES


SHARE
KEYWORDS
Sensor networks

Computer intrusion detection

Multimedia

Biological research

Data modeling

Biomimetics

Back to Top