Network Security and wireless sensor networks using in the Human Immune System
Sri Vasavi College, Erode Self-Finance Wing, 3rd February 2017. National Conference on Computer and Communication, NCCC’17. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)
Download this PDF format
Network Security has become very important in today’s world, as a result of which various methods are adopted to bypass it. Network administrators need to keep up with the recent advancements in both the hardware and software fields to prevent their as well as the user’s data. Wireless sensor network is one of the most growing technologies for sensing and performing the different tasks. Such networks are beneficial in many fields, such as emergencies, health monitoring, environmental control, military, industries and these networks prone to malicious users' and physical attacks due to radio range of network, un-trusted transmission, unattended nature and get access easily. Security is a fundamental requirement for these networks. In this paper, our centre of attention is on physical attacks and issues in wireless sensor networks. Through this review, easily identify the purpose and capabilities of the attackers. Further, we discuss well-known approaches of security detection against physical attacks. Human immune system, which survives under dynamic changing conditions and provides protection against biological viruses and bacteria. By taking immune system as an analogy, we propose Formal methods may also be useful for proving properties on the specified models. These proofs could be performed automatically, using model checkers, or interactively through proof tools. Our solution not only overcomes limitations of traditional security solutions, but also enhances overall security by providing protection at each stage of the attack timeline. It functions in proactive and also reactive manner and has ability to learn and improve its strategies, equivalent to what human immune system does against viruses and bacteria.
1.Twycross, J.P. Integrated innate and adaptive artificial immune systems applied to process anomaly detection. University of Nottingham. 2007.
2.Jung Won K.; Bentley, P, The Human Immune System and Network Intrusion Detection, Department of Computer Science, University of London, Gower Street, London, WCIE 6BT, U.K.
3. Lewis, F.L., 2004. Wireless sensor networks. Smart environments: technologies, protocols and applications, pp: 11-46.
Network Security, Wireless sensor network, Formal methods, attack timeline, Physical attacks.