Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
The Vision of Autonomic Computing
Computer
ARA - The Ant-Colony Based Routing Algorithm for MANETs
ICPPW '02 Proceedings of the 2002 International Conference on Parallel Processing Workshops
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Firefly-inspired sensor network synchronicity with realistic radio effects
Proceedings of the 3rd international conference on Embedded networked sensor systems
Medium access control issues in sensor networks
ACM SIGCOMM Computer Communication Review
Design patterns from biology for distributed computing
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
IEEE Transactions on Mobile Computing
AntNet: distributed stigmergetic control for communications networks
Journal of Artificial Intelligence Research
A taxonomy of biologically inspired research in computer networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Last year's biologically inspired systems had received a great interest. Behavior of social insects, DNA computation, artificial neural networks, evolutionary computation, and artificial immune systems are some of the interests which can be highlighted. Wireless sensor networks have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. While wireless sensor networks, node misbehavior can cause the packet dropping, packet modification, packet misrouting, selfish node behavior, and so on. A biologically-inspired algorithm for detecting misbehaving nodes in a wireless sensor network is presented. Such an algorithm, inspired by the behavior of some social spiders from Congo, a specially their strategy to collaborate for detecting an intrusion in their web.