Sensitive Ants for Denial Jamming Attack on Wireless Sensor Network

  title={Sensitive Ants for Denial Jamming Attack on Wireless Sensor Network},
  author={Camelia-Mihaela Pintea and Petrică C. Pop},
The Quality of Service in security networks systems is constantly improved. The current paper propose a newly defense mechanism, based on ant system, for different jamming attack on Wireless Sensor Network (WSN). The sensitive ants react on attacks based on several reliable parameters including their level of sensitivity. The information in network is re-directed from the attacked node to its appropriate destination node. The paper analyzes how are detected and isolated the jamming attacks… 

Denial jamming attacks on wireless sensor network using sensitive agents

A new general defence mechanism, based on multi-agents in order to stop jamming attacks on Wireless Sensor Network (WSN), is described and the reaction of artificial sensitive agents to several stigmergic variables is discussed to keep the tracks of intruders in a sensor network.

Amn-Pso Method For Jamming Unmanned Aerial Vehicle Network

A new jamming method AMN-PSO (Achieving Maximal NJRL based on PSO) is provided for UAVs jamming attack that includes the Tabu search concept to improve its performance.

Similarities and sensitivity: Immune and ant algorithms applied towards robotics

The current paper studies the similarities between Ant-based algorithms and Artificial Immune Systems and their further steps in the development of robots and studies the sensitive approaches and several related robotic applications solved by means of both presented algorithms.

Medical Image Processing: A Brief Survey and a New Theoretical Hybrid ACO Model

A new theoretical hybrid Ant Colony Optimization model is introduced in order to enhance medical image processing and uses artificial ants with different levels of “sensitivity” and also a model of "direct” communication as in Multi-Agent Systems.



Jamming attack detection and countermeasures in wireless sensor network using ant system

An extension to the security of physical layer of a predictive sensor network model using the ant system is proposed, which helps in achieving maximum reliability on DoS claims improving the Quality of Service (QoS) of WSN.

Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model

A new conceptual model Hybrid Sensitive Robot Metaheuristic for Intrusion Detection that uses the reaction of virtual sensitive robots to different stigmergic variables in order to keep the tracks of the intruders when securing a sensor network.

DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks

This paper proposes a lightweight protocol called DICAS that mitigates these attacks by detecting, diagnosing, and isolating the malicious nodes, and builds a secure routing protocol, LSR, which in addition supports multiple node-disjoint paths.

Denial of Service in Sensor Networks

To identify denial-of-service vulnerabilities, the authors analyzed two effective sensor network protocols that did not initially consider security and demonstrate that consideration of security at design time is the best way to ensure successful network deployment.

Traffic Rerouting Strategy against Jamming Attacks in WSNs for Microgrid

A traffic rerouting scheme in wireless communication infrastructure for islanded microgrid that reduces the effect of jamming attack and distribute traffic flows on different detour paths and outperforms a conventional scheme in terms of packet delivery ratio and end-to-end delay.

A survey on jamming attacks and countermeasures in WSNs

The objective of this article is to provide a general overview of the critical issue of jamming in WSNs and cover all the relevant work, providing the interested researcher pointers for open research issues in this field.

The feasibility of launching and detecting jamming attacks in wireless networks

This paper proposes four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluates their effectiveness in terms of how each method affects the ability of a Wireless node to send and receive packets.

MPC: Mitigating Stealthy Power Control Attacks in Wireless Ad Hoc Networks

  • Issa M. Khalil
  • Computer Science
    GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
  • 2009
It is shown through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy power control attacks while MPC successfully mitigates them.


The proposed Sensitive ACS (SACS) model extends ACS using the sensitive reaction of ants to pheromone trails to facilitate a good balance between search exploitation and search exploration.