Detecting Sybil Attacks in Image Sensor Network Using Cognitive Intelligence
DOI: 10.1145/1287731.1287746 Conference: Proceedings of the First ACM Workshop on Sensor and Actor Networks, SANET 2007, Montréal, Québec, Canada, September 10, 2007
Abstract - Wireless Sensor Network (WSN) is appliedin many indoor and outdoor applications, such as military, building security surveillance system, environmenta l monitoring, health-care etc. In this paper, an Imag e Sensor Network (ISN) under Sybil attack is analyzed and a novel detection mechanism,using,hypothesis testing with Cognitive Intelligence is proposed. The performance of the application solely depends,on,accurately identifyin g images under harsh environmental conditions. Since the network changes over time, a cognitive algorithm, Swarm intelligence (SI) is used in detecting and re-routi ng the image co-efficients. The proposed method, does not require any additional hardware, hence the survivability
Get notified about updates to this publicationFollow publication
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.
- [Show abstract] [Hide abstract]
ABSTRACT: Distributed, autonomous and energy efficient protocols are best suited for wireless sensor networks, where network needs and events are dynamic. In this paper, a wireless face recognition system with limited resources such as energy, memory and bandwidth is analyzed. The performance of the applications is influenced by the protocol adaptability and quality of information. Performance comparisons are completed using 1. In-network image compression using Contourlet and Wavelet transforms versus raw image data transmission, 2. longevity of sensors versus network throughput. Balancing resource constraints, maintaining network lifetime and throughput is a non-deterministic polynomial computation time problem. Thus a meta-heuristic combinatorial algorithm, based on swarm intelligence, forms the cognitive routing protocol. The network efficiency considers energy consumption, response time, probability of correct acceptance, processing and computation time for wireless image transmission.
Conference Paper: Increasing QoS and Security in 4G Networks Using Cognitive Intelligence[Show abstract] [Hide abstract]
ABSTRACT: Mobile networks have become an essential part of our day to day lives. The information shared requires secure communications with high reliability and quality-of-service (QoS). Hence, designing a 4G network to provide secure IP-based service by trading off constraints such as battery life, bandwidth and size to mobile users is a challenging task. In this paper, a cognitive framework using an evolutionary algorithm, Swarm Intelligence, is proposed. This framework uses a novel approach that utilizes a cost function that chooses the optimal parameters to provide an adaptive quality of service (QoS) based on the user's needs. This approach ensures interoperability and scalability between different modulation techniques in the physical layer and enhances security against denial of service attacks such as jamming attacks and signaling attack.
- [Show abstract] [Hide abstract]
ABSTRACT: This paper proposes to use Contourlet transform for image compression and feature extraction for wireless face recognition system. The properties of face images and face recognition techniques are incorporated into the design of wireless transmission for such a system. The reasons for utilizing contourlet transform are two-folded. Firstly, in face recognition, the edge information is crucial in deriving features, and the edges within a face image are not just horizontal or vertical. When the coefficients are transmitted through the fading channel, the reconstruction from the Stein-thresholded noisy coefficients by contourlet achieves less mean square error than by wavelet. Secondly, when the network resources limit the transmission of full-set coefficients, the lower band coefficients can serve as a scaled-down version of the face image, for a coarser face recognition as screening. A prioritized transmission of the coefficients take full advantage of the wireless channel. Simulation shows that the wireless face recognition system works as well as a wired one, while gaining the cost efficiency, and the flexibility in deployment. An interesting phenomenon is discovered on FERET database that when the transmission error rate is increased linearly, the recognition performance degradation is not linear; instead, the performance stays the same for a large range of error rates, which illustrates that contourlet based face recognition system can tolerate the transmission error up to some threshold.