<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Improving WSN Routing and Security with an Arti cial Intelligence approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sandeep Kumar E</string-name>
          <email>sandeepe31@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Dept. of Telecommunication Engineering Jawharlal Nehru National College of Engineering</institution>
          ,
          <addr-line>Shimoga, Karnataka</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Routing in Wireless Sensor Networks</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>Wireless Sensor Network (WSN) refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment, and organizing the collected data at a central location. Research in WSNs is gaining interest due their di erent applications and the challenges that the constrained resources of sensor nodes bring on the eld. In this type of ad-hoc network, routing of data to the base station with secure transmission is of prime concerns. In this paper, we discuss possible improvements in WSN routing and security through the employment of concepts coming from Arti cial Intelligence (AI) area, such as swarm intelligence, arti cial immune systems and articial neural networks. Since WSNs are distributed computing networks, the use of AI makes the network \cognitive" toward solving problems these networks are often prone to.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>Ad-hoc networks</kwd>
        <kwd>LEACH protocol</kwd>
        <kwd>bioinspired computing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        neural networks [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], evolutionary algorithms (genetics [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], memetics [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], etc.) for
nding optimal path for data transmission in a network. The proposed routing
techniques can be simulated and tested in a standard simulation platform and
the results can be compared with the pre-existing protocols like LEACH.
      </p>
      <p>In brief, this section discusses the imitation of grouping behaviors and
optimal solution nding technique of living creatures, that can be implemented in
WSNs for routing data e ciently to the base station.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Security in Wireless Sensor Networks</title>
      <p>
        Research in security is challenging and complex, when compared with other
issues related to WSNs [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ][
        <xref ref-type="bibr" rid="ref25">25</xref>
        ][
        <xref ref-type="bibr" rid="ref26">26</xref>
        ][
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. In fact, these networks operate with
minimum human intervention, due to which they are prone to additional security
threats and vulnerabilities [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In this context, we can design novel security
techniques for defending against malicious attacks in the network. The proposed
ideas for the security in WSNs are described in the following.
      </p>
      <p>
        A combination of AI with the public keying techniques can be applied for
WSNs. The concepts of Arti cial Immune Systems (AIS) like negative selection
algorithm [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], immune networks [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], danger theory [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], clonal selection algorithm
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] which are basically pattern recognition methodologies can be combined with
the random keying techniques (where keys are antibodies against packets which
act as antigens) for combating against the security threats. This method can
be simulated and tested in standard platforms. The obtained results should be
compared with the other widely used keying techniques. This technique
combats against some of the security threats like spoo ng, denial of service,
manin-middle and sinkhole attacks by confusing the intruder by introducing more
randomness in key generation using bioinspired mathematical operations.
      </p>
      <p>A novel approach of inducing the cognitive behavior of vertebrate living
organisms is proposed in this paper. This algorithm in a legitimate sensor node
takes the randomness of an attacker node into account. The randomness can be
related to energy of the attack packet, position of the attacker, strategy of the
attacker, so on. For this purpose, the algorithm uses an arti cial neural network
that is trained according to the previous attack patterns and the strategy,
associated payo s for the picked strategy, and is modeled using game theory. This
technique is specially designed to combat against the node capture attack by
combining game theory with arti cial neural networks. A simulation
environment with the malicious attacker, victim node with the proposed algorithm, and
the game between them can be modeled and the results can be calibrated.</p>
      <p>In brief, this section highlights the usage of AI concepts, to defend against
few security threats and attacks. This results in the sensor node being cognitive
in handling the security vulnerabilities, especially in remote monitoring and
surveillance applications.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Related Works</title>
      <p>
        This section discusses few of the works carried in this area. Anthony et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]
propose a method to identify the routing path using cuckoo search optimization
algorithm. They claim that the path found by the technique is more energy e
cient than the existing protocols. The paper uses the brood parasitism of cuckoo
birds for optimal path identi cation. In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], a novel method for clustering in
WSNs is proposed. The paper highlights the usage of social behaviors of Rhesus
Macaque monkeys and claim that the method provides energy e cient solution
for routing. Sandeep et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] propose a method of clustering for WSNs based
on the nest searching strategy of cuckoo bird. Vikram [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] proposes the usage
of bacterial foraging technique as an optimization strategy for clustering of
sensor networks. In [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], a technique is proposed, which uses re y's light ashing
behavior for clustering in wireless sensor networks. Bharathi et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] discusses
the usage of elephant's swarm optimization technique for e cient data
aggregation in wireless sensor networks. Eshan et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] propose e cient routing
protocol based on the combination of ant colony optimization with fuzzy
techniques. Hosein et al. [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] propose a technique of securing WSNs using ant colony
optimization for nding a trustable path for communication. Heena et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]
discuss a method of imitating the immune system of vertebrates. It combines
the concept of AIS with machine learning technique to defend against the
malicious packets. Wei- Ren et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] propose a bio- inspired technique using the
self- organizing neural networks with competitive learning for security in WSNs.
Suman et al. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] propose a technique of securing clustered sensor networks using
random keying technique with memetic operators. Matthias et al. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] discuss a
technique that combines AIS with Bayesian classi er for intrusion detection. In
[
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], a method of using random keying techniques with AIS for detecting spoofed
packets in hierarchical wireless sensor networks is proposed.
      </p>
      <p>Still there are many research works, which adapt bioinspired computation
for solving issues of wireless sensor networks; in this paper, we discuss majorly
the usage of arti cial intelligence to solve routing and security related issues of
WSNs.</p>
    </sec>
    <sec id="sec-4">
      <title>Novelty in the proposal</title>
      <p>
        In one of our previous works [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], we proposed an algorithmic approach of using
Rhesus Macaque animal's social behavior for energy e cient clustering in WSNs,
which includes the wandering behavior of male monkeys, splitting of monkey
groups, choosing of group heads and queens, etc. In this context, we can further
study the behaviors of other living creatures and extract intelligent patterns
that can be adapted for solving issues of WSNs e ectively. In addition, existing
nature inspired optimization algorithms can be modi ed such that it can be
adapted for the resource constrained sensor nodes. In the majority of the research
works, the optimization algorithm is performed by special type of sensor nodes
called the anchor nodes [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. They perform the operation of choosing the cluster
heads and disseminating the information. This increases the deployment cost.
Instead, if optimization algorithms are made to execute in all the sensor nodes,
the nodes may exhaust the resources due to burden of computation, memory and
storage. Hence, we can obtain solution for this problem by adapting optimization
algorithms, such that it can be executed only once with a notion of choosing a
cluster head, and forming clusters of their own in WSN environment [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. This
might not lead to optimal cluster head choice, but may approximate and a
tradeo can be brought in. Hence, these algorithms can serve as light weighted
protocols best suitable for sensor network applications.
      </p>
      <p>
        According to the survey, majority of the concepts related to AI like AIS,
ANNs, combinations between them, etc. have been applied for wireless sensor
networks. Nevertheless, still the concepts of evolutionary algorithms like
genetics, memetics and AIS concepts like Negative Selection Algorithm, Dendritic cell
theory, etc. can be combined with keying techniques (public, private, random,
so on) to improve the strength of cryptographic algorithms, trust and security
protocols. In our previous work, we have attempted few of the AI derived
techniques [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ][
        <xref ref-type="bibr" rid="ref22">22</xref>
        ][
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]. However, still many research works can be carried out in this
context.
      </p>
      <p>The strategy making capability of vertebrates to achieve a given task can
be implemented in sensor nodes. This is achieved by combining game theory
with machine learning algorithms. Here game theory helps in modeling di erent
strategies of the individuals with their associated payo s. The use of machine
learning helps in visualizing the attack scenario. Implementation of this
concept leads to a cognitive system that can think and act based on the attacks
with its associated intruder strategies. Games like noncooperative, repetitive,
Bayesian, cooperative combined with the machine learning concept leads to a
novel approach towards securing WSNs.</p>
      <p>
        Here, we can notice three things, the usage of arti cial intelligence in
clustering, cryptographic keys to immune and secure their communications when
attempted for sinkhole attack, hello ood attack, spoo ng attack and so on. To
provide additional security against the node capture attack one can opt for the
combination of game theory with machine learning techniques [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>We can implement the above routing and security concepts in every sensor
node of the deployed network as a protocol stack. By this, we can make
sensor nodes behave more intelligently to group, secure communication and combat
against the attack if intrusion sustains with less help from Base Station. The
combination of all these may lead to a \cognitive sensor network" not with the
notion of having cognitive radio in it, but the nodes which are having the
capability to visualize and take actions on its own in the absence of manual monitor.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Defense Mechanism for Security in</title>
    </sec>
    <sec id="sec-6">
      <title>Theory and ANN</title>
    </sec>
    <sec id="sec-7">
      <title>WSN using Game</title>
      <p>This paper discusses the applications of bio- inspired computation towards
solving the issues and challenges of WSNs. As an example, a novel method of securing
WSN against node capture attack is explained in detail. The section highlights a
technique of imitating cognitive behavior of vertebrates while defending against
attacks. As introduced before in section 2 and section 4, this is achieved by
combining game theory with arti cial neural networks. Game theory is used for
modeling the strategic moves of victim node and attacker node while, ANN is
used as pick and play tool by learning the attacker. The proposed methodology
can be applied when a malicious intruder is trying for a node capture attack. A
node capture attack is de ned as an attack where the attacker captures a node
and hacks the critical information (eg., cryptographic algorithms) residing in the
node. The defense mechanism module is shown in Fig 2. This module is designed
to be built in every sensor node, which can combat against such attacks, with
minimal help from Base Station. An adversary is assumed to attack any victim
node by sending malicious packets to hack the information in the victim node.
Intruder node is assumed mobile with its attack packet bit energy varying, such
that the intruder's mobility and bit energy of attack packet is highly random in
nature. Even, the attacker's strategy is random.</p>
      <p>The proposed Intruder Defense System (IDS) has to be installed in a sensor
node as an add-on application together with a cryptographic algorithm. The
system will be ignited if number of erroneous packets detected by cryptographic
scheme crosses beyond a particular threshold. IDS once ignited continuously
combats against a malicious intruder until the game between the intruder and
the victim reaches a zero sum game i.e., either intruder stops sending poison
packets or dies losing its battery power or victim node is infected or dies losing
its battery power.</p>
      <p>The module consists of an ANN, whose inputs are distance, bit energy,
attack count and attacker strategy. Distance input of ANN is de ned as the
distance between the attacker and the victim, which is the information sent by
the BS from time to time until the game exists. Bit energy input is the energy
per bit of the poison packet reaching the victim node. attack count input is the
previous attack counts from that intruder under vigilance, which will be updated
from time to time. Apart from these, the neural network chip will be enabled
only if the attacker's strategy is in attack mode. The output of the neural
network is a decision depending all these inputs fed. It can be either to defend or
not defend, depending on which the transmitter module will be enabled, and its
transmitting energy per bit of the defense packet will be varied according to the
scenario.</p>
      <p>In Figure 2, there is a timer module, which monitors the intruder and initiates
counter attack when the intruder is idle for a long time. This type of attack
repeats for few times and stops if the intruder quits its attack.
5.1</p>
      <p>Game theoretic modeling
Game theory is a mathematical concept, which deals with the formulation of the
correct strategy that will enable an individual or entity when confronted by a
complex challenge to succeed in addressing that challenge.</p>
      <p>Proposed game model The method proposed is a non-cooperative game
between a malicious node and the IDS. The action set of malicious node is
Am = fA; N Ag and that of IDS is AI = fD; N Dg the game ends if either of
the one seizes its operation, leading to zero-sum game. Table 1 gives the payo
matrix. The move chosen by IDS solely depends on the accuracy of Neural
Network design. E1 is the utility cost for the IDS on reception of an intruder packet
`I' is the packet sent by the intruder and `A' is the alarm packet used to counter
attack intruder by the victim node. Epro is the energy for processing the intruder
packet including the computation energy of the neural network, n is the path
loss component.</p>
      <p>E2 = (Erx A) + (Epro A) + (Etx I) + (Eamp I dn)
If IDS chooses not to defend while the intruder is on attack then the utility cost
is given by</p>
      <p>E3 = (Erx I)
X = X</p>
      <p>XC</p>
      <p>E4 = (Etx I) + (Eamp I dn)
Where, XC is the damage cost of the node for choosing not to defend when the
intruder is on attack. X is the residual cost of the victim node. The value of XC
is decided by the amount of damage done by the intruder on the victim node,
by hacking information, changing frequency, so on. If Intruder chooses not to
attack if IDS is on defense, then the payo is given by</p>
      <p>E5 = (Erx A)</p>
      <p>Y = Y</p>
      <p>YC</p>
      <p>E6 = (Etx A) + (Eamp A dn)
YC damage cost of intruder for not attacking the victim node, while the IDS
is in defense. Y is the residual cost of the intruder. If intruder chooses not to
attack and if IDS chooses not to defend then the utility cost for each is 0.
Apart from these payo s, an intruder has to spend energy in listening all the
nodes in network and attacking a node. If Pl is the power consumed per second
for listening then, the overall energy consumed by the intruder for listening N
number of nodes, is given by</p>
      <p>Elisten = Pl t N
Where, t is the time dedicated by intruder in listening to each node, N is the
total number of nodes in the network and it should be noted that intruder
details are unknown to the defender. In the proposed game fND, NAg is the
Nash equilibrium condition. fD, Ag is the Pareto optimal strategy for the entire
game. In speci c fND, Ag is the Pareto Optimality for an intruder and fD, NAg
is the Pareto Optimality for IDS.</p>
      <p>The e ciency of the game depends entirely on the accuracy of the ANN.
The game discussed in this method is a non- cooperative game. Similarly, we
can adapt a Bayesian game, repetitive game, so on. For the deployment of this
module in a sensor node, ANN has to be pre trained with these type of attacks,
which might have happened prior in a network. Implementing this technique in
sensor node makes it to self defend against the malicious node attacks in WSNs.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
Neural Network and its associated training matrices Arti cial Neural
Networks are the imitations of biological neural networks. It accepts nite set
of inputs and computes the weighted sum. The sum is compared with suitable
threshold. The summation and threshold unit is called a node in ANN. Always
a NN requires training and is the most di cult task, where we nd the weights
that achieve goal with acceptable performance. For the proposed work, we use
NN with 3 neurons in the input layer, few neurons in the hidden layer and 4
neurons in the output layer. Neurons in the hidden layer depend solely on the
cost and the accuracy of ANN. Well-known back- propagation algorithm can be
used for training. This is an example implementation and other variants of ANN
can be implemented.</p>
      <p>An example Training matrix is shown in Table 2. X indicates `do-not care'
condition. E1, E2, E3, E4 are the assumed extremes, dividing the received bit
energy levels of the intruder into three classes. C1, C2, C3, C4 are the extremes
dividing the count input, fed to the IDS. C1 and c2 are used in Table 2, by
considering C3 and C4, and conditions d0 = d and d0 &gt; d, remaining conditions
for training NN can be derived. C is the intruder's previous attack count, d is
the initial distance between attacker and the victim node and d0 is the randomly
changing distance between them. It is to be noted that, the output energy level
indicators are restricted for four levels. For still better design, we can opt for
more level indicators, but with a tradeo of more neurons requirement rendering
increase in the complexity of the design. In addition, the input count can be
still divided into a ner class for better combat, but with the tradeo with the
complexity of ANN design.
6</p>
    </sec>
    <sec id="sec-8">
      <title>Conclusions</title>
      <p>In this paper we discuss about possible approaches of using Arti cial
Intelligence in handling issues of WSNs like energy consumption in data transmission
for e cient routing and security in WSNs|while making the network
cognitive towards handling the challenges arising while in operation. The concepts
discussed in this paper direct the researchers for the use of bioinspired
computation toward solving problems of WSNs by making sensor nodes more intelligent.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Chelbi</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abdouli</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bouaziz</surname>
            <given-names>R.</given-names>
          </string-name>
          , Duvallet C.
          <article-title>: Multi-hop Energy E cient routing protocol based on Data Controlling for Wireless Sensor Networks</article-title>
          .
          <source>International Conference on Computer Systems and Applications (AICCSA)</source>
          ,pp
          <fpage>1</fpage>
          <issue>{6</issue>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Qiang</given-names>
            <surname>Do</surname>
          </string-name>
          , Aihua Shao, Kang Zhu, Peisi Chu, Yonghua Xiao,
          <article-title>Yunfeng Peng, Keping Long: An energy e cient routing protocol for Wireless Sensor Network</article-title>
          . 18th AsiaPaci c Conference on
          <source>Communications (APCC)</source>
          ,pp
          <fpage>823</fpage>
          {
          <issue>827</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Xin-She</surname>
            <given-names>Yang</given-names>
          </string-name>
          :
          <article-title>Nature- Inspired Metaheuristic Algorithms</article-title>
          . Luniver press, (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Krishnanand</surname>
            <given-names>K. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Debasish</surname>
            <given-names>Ghose</given-names>
          </string-name>
          :
          <article-title>Glowworm swarm optimization for simultaneous capture of multiple local optima of multimodal functions</article-title>
          .
          <source>Journal of Swarm Intelligence</source>
          ,pp
          <volume>87</volume>
          {
          <issue>124</issue>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Mohamad H Hassoun</surname>
          </string-name>
          :
          <article-title>Fundamentals of arti cial neural networks</article-title>
          . MIT Press, (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Moscato</given-names>
            <surname>Pablo</surname>
          </string-name>
          :
          <article-title>On evolution, search, optimization, genetic algorithms and martial arts: Towards memetic algorithms</article-title>
          .
          <source>Caltech concurrent computation program, C3P Report 826</source>
          , (
          <year>1989</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Shigen</given-names>
            <surname>Shen</surname>
          </string-name>
          , Guangxue Yue, Qiying Cao:
          <article-title>A Survey of Game Theory in Wireless Sesnor Networks Security</article-title>
          .
          <source>Journal of Networks</source>
          , Vol.
          <volume>6</volume>
          (
          <issue>3</issue>
          ),pp
          <fpage>521</fpage>
          {
          <issue>532</issue>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Patel</surname>
            <given-names>M.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aggarwal</surname>
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Security attacks in wireless sensor networks: A survey</article-title>
          .
          <source>IEEE International Conference on Intelligent Systems and Signal Processing (ISSP)</source>
          ,pp
          <fpage>329</fpage>
          {
          <issue>333</issue>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Jason</given-names>
            <surname>Brownlee: Clever Algorithms: Nature-Inspired Programming</surname>
          </string-name>
          <string-name>
            <surname>Recipes</surname>
          </string-name>
          , (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Anthony Arul Raj D.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Sumathi</surname>
            <given-names>P.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Enhanced Energy E cient Multipath</surname>
          </string-name>
          <article-title>Routing Protocol for Wireless Sensor Communication Networks using Cuckoo Search Algorithm</article-title>
          . Wireless Sensor Networks,
          <volume>6</volume>
          , pp
          <fpage>49</fpage>
          -
          <lpage>55</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Sandeep</surname>
          </string-name>
          Kumar E.,
          <string-name>
            <surname>Kusuma</surname>
            <given-names>S M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vijaya Kumar</surname>
            <given-names>B.P.</given-names>
          </string-name>
          :
          <article-title>Clustering Protocol for Wireless Sensor Networks based on Rhesus Macaques ( Macaca mulatta) Animal's Social Behavior</article-title>
          .
          <source>International Journal of Computer Applications (IJCA)</source>
          , Vol.
          <volume>87</volume>
          (
          <issue>8</issue>
          ), pp
          <fpage>20</fpage>
          -
          <lpage>27</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Sandeep</surname>
          </string-name>
          Kumar E.,
          <string-name>
            <surname>Mohanraj</surname>
            <given-names>G.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raghuchandra</surname>
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Goudar</surname>
          </string-name>
          <article-title>: Clustering Approach for Wireless Sensor Networks based on Cuckoo Search Strategy</article-title>
          .
          <source>International Journal of Advanced Research in Communication and Computer Engineering (IJARCCE)</source>
          , Vol.
          <volume>3</volume>
          (
          <issue>1</issue>
          ), pp
          <fpage>92</fpage>
          -
          <lpage>95</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Vikram</surname>
          </string-name>
          <article-title>Dhiman: Bio- Inspired Hybrid Routing Protocol for Wireless Sensor Networks</article-title>
          .
          <source>International Journal for Advance Research in Engineering and Technology</source>
          , Vol.
          <volume>1</volume>
          (
          <issue>4</issue>
          ), pp
          <fpage>33</fpage>
          -
          <lpage>36</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Sandeep</surname>
          </string-name>
          Kumar E.,
          <string-name>
            <surname>Kusuma</surname>
            <given-names>S M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vijaya Kumar B.P.: Fire- LEACH: A Novel Clustering</surname>
          </string-name>
          <article-title>Protocol for Wireless Sensor Networks based on Fire y Algorithm</article-title>
          .
          <source>International Journal of Computer Science: Theory and Applications (IJCSTA)</source>
          , Vol.
          <volume>1</volume>
          (
          <issue>1</issue>
          ), pp
          <fpage>12</fpage>
          -
          <lpage>17</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Bharathi</surname>
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vijaya Kumar</surname>
            <given-names>B.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Manjaiah</surname>
            <given-names>D.H.</given-names>
          </string-name>
          :
          <article-title>Cluster based Data Aggregation in WSN using Swarm Optimization Technique</article-title>
          .
          <source>International Journal of Engineering and Innovative Technology (IJEIT)</source>
          , Vol.
          <volume>2</volume>
          (
          <issue>12</issue>
          ), pp
          <fpage>140</fpage>
          -
          <lpage>144</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Eshan</surname>
            <given-names>Amiri</given-names>
          </string-name>
          , Hassan Keshavarz, Mojtaba Alizadeh, Mazdak Zamani, Touraj Khodadadi:
          <article-title>Energy E cient Routing in Wireless Sensor Networks based on Fuzzy Ant Colony Optimization</article-title>
          .
          <source>International Journal of Distributed Sensor Networks</source>
          , Vol.
          <year>2014</year>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Hosien</surname>
            <given-names>Marzi</given-names>
          </string-name>
          ,
          <article-title>Mengdu Li a: An Enhanced Bio- Inspired Trust and Reputation Model for Wireless Sensor Networks</article-title>
          .
          <source>Proc. of 4th International Conference on Ambient Systems, Networks and Technologies, Procedia of Computer Science</source>
          , Vol.
          <volume>19</volume>
          , pp
          <fpage>1159</fpage>
          -
          <lpage>1166</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Heena</surname>
            <given-names>Rathore</given-names>
          </string-name>
          , Venkataramana Badaria, Sushmitha Jha, Anupam Gupta:
          <article-title>Novel Approach for Security in Wireless Sensor Network using Bio- inspiration</article-title>
          .
          <source>Proc. of 6th International Conference of Communication Systems and Networks (COMSNETS)</source>
          , IEEE, Indian Institute of Science, Bangalore, pp
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Wei</surname>
            <given-names>Ren</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jun</surname>
            <given-names>Song</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            <given-names>Ma</given-names>
          </string-name>
          , Shiyomg Huang:
          <article-title>Towards a Bio- inspired Security Framework for Mission- Critical Wireless Sensor Networks</article-title>
          .
          <source>Computational Intelliegence and Intelligent Systems, Communications in Computer Science and Information Science</source>
          , Vol.
          <volume>51</volume>
          , pp
          <fpage>35</fpage>
          -
          <lpage>44</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Suman</surname>
            <given-names>S.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ranjith</surname>
            <given-names>Kumar P.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandeep</surname>
          </string-name>
          Kumar E.:
          <article-title>Random Keying technique for Security in Wireless Sensor Networks based on Memetics</article-title>
          .
          <source>International Journal of Computer Science: Theory and Applications</source>
          , Vol.
          <volume>1</volume>
          (
          <issue>2</issue>
          ), pp
          <fpage>25</fpage>
          -
          <lpage>31</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Matthias</surname>
            <given-names>Becker</given-names>
          </string-name>
          , Martin Drozda, Sven Schaust,
          <string-name>
            <given-names>Sebastian</given-names>
            <surname>Bohlmann</surname>
          </string-name>
          , Helena Szczerbicka:
          <article-title>on Classi cation Approach for Misbehavior Detection in Wireless Sensor Networks</article-title>
          .
          <source>Journal of Computers</source>
          , Vol.
          <volume>4</volume>
          (
          <issue>5</issue>
          ), pp
          <fpage>357</fpage>
          -
          <lpage>365</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Sandeep</surname>
          </string-name>
          Kumar E.,
          <string-name>
            <surname>Kusuma</surname>
            <given-names>S.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vijaya Kumar B.P.:</surname>
          </string-name>
          <article-title>A Random Key distribution based Arti cial Immune System for Security in Clustered Wireless Sensor Networks</article-title>
          .
          <source>Proc. of 2nd IEEE Students' Conference on Electrical, Electronics and Computer Science (SCEECS)</source>
          , MANIT, Bhopal, Madhya Pradesh,
          <string-name>
            <surname>India</surname>
          </string-name>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Haojun</surname>
            <given-names>Huang</given-names>
          </string-name>
          , Guangmin Hu, Fucai Fu:
          <article-title>Energy-aware geographic routing in wireless sensor networks with anchor nodes</article-title>
          .
          <source>International Journal of Communication systems</source>
          , Vol.
          <volume>26</volume>
          (
          <issue>1</issue>
          ), pp
          <fpage>100</fpage>
          -
          <lpage>113</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Reza</surname>
            <given-names>Khoshkangini</given-names>
          </string-name>
          , Syroos Zaboli, Mauro Conti:
          <article-title>E cient Routing Protocol via Ant Colony Optimization (ACO) and Breadth First Search (BFS)</article-title>
          .
          <source>In Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing (IEEE CPSCom</source>
          <year>2014</year>
          ), in press, Taipei, Taiwan, September 1-
          <issue>3</issue>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Conti</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Di Pietro R.</given-names>
            ,
            <surname>Mancini L</surname>
          </string-name>
          . V.:
          <article-title>Secure cooperative channel establishment in wireless sensor networks</article-title>
          .
          <source>In Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (IEEE PerCom 2006 workshop: PerComW</source>
          <year>2006</year>
          ), pages
          <fpage>327</fpage>
          -
          <lpage>331</lpage>
          , Pisa, Italy, March
          <volume>13</volume>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Mauro</surname>
            <given-names>Conti</given-names>
          </string-name>
          , Roberto Di Pietro, Angelo Spognardi:
          <article-title>Wireless Sensor Replica Detection in Mobile Environments</article-title>
          .
          <source>In Proceedings of the 13th International Conference on Distributed Computing and Networking (ICDCN</source>
          <year>2012</year>
          ),
          <source>Hong Kong, January 3-6</source>
          , pages
          <fpage>249</fpage>
          -
          <lpage>264</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Sankardas</surname>
            <given-names>Roy</given-names>
          </string-name>
          , Mauro Conti, Sanjeev Setia, Sushil Jajodia:
          <article-title>Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact</article-title>
          .
          <source>In (IEEE) Transactions on Information Forensics &amp; Security</source>
          ,
          <volume>9</volume>
          (
          <issue>4</issue>
          ): pages
          <fpage>681</fpage>
          -
          <lpage>694</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Andrea</surname>
            <given-names>Gabrielli</given-names>
          </string-name>
          , Luigi V.
          <article-title>Mancini: Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks</article-title>
          . ,
          <source>In Proc. of the Bio-Inspired Computing and Communication: 1st Workshop on Bio-Inspired Design of Networks (Biowire</source>
          <year>2007</year>
          ), Cambridge, UK,
          <string-name>
            <surname>April</surname>
          </string-name>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Emmanouil</surname>
            <given-names>Panaousis</given-names>
          </string-name>
          , Tansu Alpcan, Hossein Fereidooni, Mauro Conti:
          <article-title>Secure Message Delivery Games for Device-to-Device Communications</article-title>
          .
          <source>In Proceedings of the 5th Conference on Decision and Game Theory for Security (GameSec</source>
          <year>2014</year>
          ), pages
          <fpage>195</fpage>
          -
          <lpage>215</lpage>
          , Los Angeles, CA, USA, November 6-
          <issue>7</issue>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>