CFP last date
22 April 2024
Reseach Article

Reputable Path Recognition in Wireless Sensor Network using Intelligent Water Drop

Published on September 2014 by Heena Rathore, Manish Goyal
Recent Advances in Wireless Communication and Artificial Intelligence
Foundation of Computer Science USA
RAWCAI - Number 3
September 2014
Authors: Heena Rathore, Manish Goyal
8742be22-705d-4334-a938-af12e3d0bdbe

Heena Rathore, Manish Goyal . Reputable Path Recognition in Wireless Sensor Network using Intelligent Water Drop. Recent Advances in Wireless Communication and Artificial Intelligence. RAWCAI, 3 (September 2014), 26-32.

@article{
author = { Heena Rathore, Manish Goyal },
title = { Reputable Path Recognition in Wireless Sensor Network using Intelligent Water Drop },
journal = { Recent Advances in Wireless Communication and Artificial Intelligence },
issue_date = { September 2014 },
volume = { RAWCAI },
number = { 3 },
month = { September },
year = { 2014 },
issn = 0975-8887,
pages = { 26-32 },
numpages = 7,
url = { /proceedings/rawcai/number3/17935-1449/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Recent Advances in Wireless Communication and Artificial Intelligence
%A Heena Rathore
%A Manish Goyal
%T Reputable Path Recognition in Wireless Sensor Network using Intelligent Water Drop
%J Recent Advances in Wireless Communication and Artificial Intelligence
%@ 0975-8887
%V RAWCAI
%N 3
%P 26-32
%D 2014
%I International Journal of Computer Applications
Abstract

Applying trust in Wireless Sensor network (WSN) is an emerging area where researchers are engrossed in developing novel design archetype to address the security issues. Security plays an important role in WSN where trustworthy sensor node turns into a untrustworthy one because of hardware and software faults. Aim of the paper is to propose an optimized path coverage algorithm with the help of an emerging biologically inspired technique, i. e. , intelligent water drop (IWD). The proposed work is guaranteed to have most reputable path leading to most trustworthy nodes in WSN. This approach uses dynamic parameters for finding all the optimal paths using basic properties of natural water drops. It proposes how different test cases can be considered as an IWD moving on the edges of the network for finding the optimal paths. The algorithm guarantees complete path coverage.

References
  1. Gomez Marmol, Felix, and Gregorio Martínez Perez. ``Providing trust in wireless sensor networks using a bio-inspired technique. '' Telecommunication systems, vol. 46, no. 2, pp. 163-180, 2011.
  2. Heena Rathore, Sushmita Jha, ``Bio-Inspired Machine Learning Based Wireless Sensor Network Security'', IEEE World Congress on Nature and Biologically Inspired Computing, no. 5, pp. 140 - 146, 2013.
  3. Heena Rathore, Venkataramana Badarla, Sushmita Jha, Anupam Gupta. ``Novel Approach for Security in Wireless Sensor Network using Bio-Inspirations'', in Proc. IEEE International Conference on Communication Systems and Networks (COMSNETS), no. 6, pp. 1-8, 2014.
  4. Heena Rathore, Abhay Samant, ``A system for building immunity in social networks", in proc. World Congress on Nature and Biologically Inspired Computing (NaBlC), no. 4, pp. 20-24, 2012.
  5. Boukerche, A. , Xu, L. , & El-Khatib, K. . ``Trust-based security for wireless ad hoc and sensor networks''. Computer Commu- nications, vol. 30, no. 11–12, pp. 2413–2427, 2007.
  6. Dhurandher, S. K. , Misra, S. , Obaidat, M. S. , & Gupta, N. ``An ant colony optimization approach for reputation and quality- of-service-based security in wireless sensor networks''. Security and Communication Networks, vol. 2, no. 2, pp. 215–224, 2009.
  7. Chen, H. , Wu, H. , Zhou, X. , & Gao, C. ``Agent-based trust model in wireless sensor networks'', in proc. ACIS international conference on software engineering, arti?cial intelligence, net- working, and parallel/distributed computing, SNPD'03 no. 8, pp. 119– 124, 2007.
  8. Ganeriwal, S. , & Srivastava, M. B. ``Reputation-based framework for high integrity sensor networks'', in proc. ACM workshop on security of Ad hoc and sensor networks, no. 2, pp. 66–77, 2004.
  9. Michiardi, P. , & Molva, R. (2002). ``CORE: a collaborative reputa- tion mechanism to enforce node cooperation in mobile Ad hoc net- works'', in proc. IFIP TC6/TC11 sixth joint working conference on communications and multimedia security, pp. 107– 121, 2002.
  10. Srinivasan, A. ,Teitelbaum, J. , & Wu, J. ``DRBTS: distrib- uted reputation-based beacon trust system'', in proc. IEEE International Symposium on dependable, autonomic and secure computing, no. 2, pp. 277–283, 2006.
  11. Shah-Hosseini, H. ``Problem solving by intelligent water drops'', in proc. IEEE Congress on Evolutionary Computation, IEEE Computer Society, pp. 3226–3231, 2007.
  12. Shah-Hosseni, H. , ``Optimization with the nature-inspired intelligent water drops algorithm'', International Journal of Bio-Inspired Computation, vol. 1, nos. 1/2, pp. 105–125, 2009.
  13. Chen, Y. et al. , ``Comparison of two fitness functions for GA-based path-oriented test data generation'', in proc. International Conference on Natural Computation, IEEE Computer Society, no. 5, pp. 2–4, 2009.
  14. Cormen, T. H. et al. Introduction to Algorithms, 2nd ed. , MIT Press, USA. 2001.
  15. Komal Agarwal, Manish Goyal, Praveen Ranjan Srivastava, `` Code Coverage using Intelligent water drop'', International Journal of Bio-inspired Computation, vol. 4, no. 6, pp 392-402, 2012.
  16. Mohammad Momani , Subhash Challa,`` Survey of Trust Models in Different Network Domains'', International Journal of Ad Hoc, Sensor and Ubiquitous Computing, vol. 1, no. 3, pp. 1-19, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Biologically Inspired Trust Wsn Iwd