You are on page 1of 4

International Journal of Advances in Engineering Sciences vol 6 Issue 1 2016

Modified AIS-PEGASIS: A protocol to secure WSN


Nipin Gupta

Malay Ranjan Tripathy

Research Scholar, Electronics & Communication Engineering,


Jagannath University, Jaipur, India
callnipin@gmail.com

Professor, Electronics & Communication Engineering,


AMITY University, Jainpur, India
mrtripathy@hotmail.com

Abstract-Wireless sensor networks are the resource


constrained networks that are prone to various attacks. In this
work, we have mapped human body to the WSN. The peripheral
nervous system is mapped with the network layer. Various
attacks on network layer can lead to energy loss to dead network.
Similarly, an attack on nervous system can lead to paralysis, etc.
A timely sensing of attack can save the person from paralysis.
This work applied this timely sensing to save network from
network layer attacks. This work designed an algorithm AISPEGASIS that saves the WSN from network layer attack and
performs routing of data in the network. This work also
represents the AIS implementation using MATLAB. The
simulation of the proposed algorithm over WSN shows better
performance as compared to conventional techniques.
Keywords- WSN, AIS, PEGASIS, AIS-PEGASIS

I.

INTRODUCTION

Wireless sensor network is a collection of thousand nodes


where each node can sense environment, i.e. temperature,
pressure, etc. The WSN is basically a battery operated
network, so the power supply is very limited. WSN also
suffers from limited availability of different other resources.
Various attacks in WSN consume these resources rapidly that
leads to the dead network [1].
A. Biological Immune System
The biological immune system is a complex adaptive
system that has evolved in vertebrates to protect them from
invading pathogens. To accomplish its tasks, the immune
system has evolved sophisticated pattern recognition and
response mechanisms following various differential pathways,
i.e. depending on the type of enemy, the way it enters the body
and the damage it causes, the immune system uses various
response mechanisms either to destroy the invader or to
neutralize its effects [2]. The biological immune system can be
envisioned as a multilayer protection system, where each layer
provides different types of defense mechanisms for detection,
recognition and responses. Thus, three main layers include the
anatomic barrier, innate immunity (nonspecific) and adaptive
(specific) immunity. In the biological immune system, signal
diffusion and dialogue are two kinds of communication
schemes available. They take a major role in sharing and
passing information during immune response. In immune
diffusion, the message is passed from one immuno-component
to others without any feedback.

Print-ISSN: 2231-2013 e-ISSN: 2231-0347

Fig. 1. The Natural Immune System Cell Division

Another scheme is called immune dialogue, where the


immune system continuously exchanges molecular signals
with its counterparts. The human body is protected against
foreign invaders by a multi-layered system. The immune
system is composed of physical barriers such as the skin and
respiratory system; physiological barriers such as destructive
enzymes and stomach acids; and the immune system, which
can be broadly viewed as of two types: innate (non-specific)
immunity and adaptive (specific) immunity, which are interlinked and influence each other [3].
B. Artificial Immune Systems (AIS)
A novel computational intelligence technique inspired by
immunology has emerged, called Artificial Immune Systems
(AIS) [4]. This immune system inspired technique has already
been useful in solving some computational problems.
The biological immune system is a robust, complex,
adaptive system that defends the body from foreign pathogens.
It is able to categorize all cells (or molecules) within the body

International Journal of Advances in Engineering Sciences vol 6 Issue 1 2016


as self-cells or non-self cells. It does this with the help of a
distributed task force that has the intelligence to take action
from a local and also a global perspective using its network of
chemical messengers for communication [5]. A novel
computational
intelligence
technique,
inspired
by
immunology, has emerged, known as Artificial Immune
Systems. Several concepts from immunology have been
extracted and applied for the solution of real-world science
and engineering problems [6].
The WSN is basically a battery operated network, so the
power supply is very limited. WSN also suffers from limited
availability of different other resources. Various attacks in
WSN consume these resources rapidly that leads to the dead
network [7]. Biological immune system is a complicated
versatile system that has developed in vertebrates to protect
them from attacking agents [8].
C. Nervous System
The nervous system is our processing system, and the
system that keeps us in contact with the outside world. It tells
us that we exist, and along with the muscles allows us to move
and react to stimuli. Our consciousness resides in our nervous
systems, as do our thoughts and emotions.
In short, the roles of the nervous system are:
responsible for coordination of movement, response to
environmental stimuli, intelligence, self-awareness,
thought, emotion.
Composed of nerve cells called neurons, which are
specialized to carry nerve impulses [9].
The nervous system has three main functions: sensory
input, integration of data and motor output. Sensory input is
when the body gathers information or data, by way of neurons,
glia and synapses. The data is then processed by way of
integration of data, which occurs only in the brain. After the
brain has processed the information, impulses are then
conducted from the brain and spinal cord to muscles and
glands, which is called motor output.
We have mapped human body with the WSN. The human
body can be treated as the network. The body consists of the
nervous system. Nervous system contains two parts, i.e.
Central nervous system and the peripheral nervous system.
The central nervous system consists of Brain and the spinal
cord. The peripheral nervous system consists of nervous to
connect the body with the brain. In WSN, we treated sink node
as the brain and nodes as the nervous. Nodes are used to
connect the network with sink node. The nodes transfer the
data packets to the sink node using multi hop network. In
other words, the data packet is transferred from the source to
the destination using different nodes. Similarly, in the body
the information is transferred to the brain using various
nervous. The system architecture is shown in figure 1.The
useful data packets are the antibody while the waste data
packets are treated as the antigens.

Print-ISSN: 2231-2013 e-ISSN: 2231-0347

Fig. 2. Nervous System

II.PEGASIS ROUTING PROTOCOL IN WSN


PEGASIS is chain based routing protocol that transmit
data packet form source node to the base station. The farthest
node from the base station is chosen as the source node. The
source node transfers the data to its closest neighbor [10]. The
node further transmits data to its nearest neighbor and process
continues until data is reached to the base station. The node
that transfer data to the base station needs extra energy as the
base station has greater distance as compared to other nodes.
This node is known as chain leader. Thus the data is
transmitted from the source node to the destination. Multiple
numbers of chains can exist within the network to transfer the
data.
III.

PROPOSED TECHNIQUE

The base station has the sensing capability and it know


details of all nodes. In other words, the base station knows the
location, energy level, packet forwarding ratio and life time,

International Journal of Advances in Engineering Sciences vol 6 Issue 1 2016


etc. all the properties of the nodes. The nodes send this
information to the base station at the constant interval of time.
The base station also knows the maximum delay possible for a
packet to deliver due to known location of nodes.
If any node or data packet is marked as the antigen, then it
is discarded by the network. The decision that any data packet
is an antigen or antibody is taken by the base station. The base
station takes the decision by analyzing the information of all
the nodes stored in it.
IV. IMPLEMENTATION
The proposed algorithm is implemented using the
MATLAB. The MATLAB doesnt contain any toolbox for the
WSN or for AIS. The m file coding is done to design the
WSN. Simulation is performed for PEGASIS protocol as well
as for the AIS-PEGASIS (proposed) protocol. The comparison
is done the different size networks by using the parameters
average energy consumption, Cost, end 2 end delay and the
throughput. The cost is defined as
Cost = energy consumption * delay
As the energy consumption and delay get decreased then
the cost of the modal also gets decreased resulting better
performance. The end 2 end delay is the time taken to transmit
the packet from source to the base station, lower the delay
better the performance. The average energy consumption is
the total energy consumed by the entire node divided by the
number of nodes. Throughput is the output in the given time.
The energy consumption must be reduced, and throughput
must be enhanced. The cost is the transmission cost calculated
by energy*delay.
Table 1 Performance of PEGASIS protocol

Numbe
r
of
nodes

End 2
end
delay

Throug
hput

Energy
consumption

Cost=
energy
*delay

50

0.525

11.21

0.389

0.204

100

0.720

12.21

0.394

0.283

150

0.915

12.51

0.392

0.358

200

1.02

13.0

0.395

0.402

Table 2 Performance of AIS-PEGASIS protocol

umber
of
nodes

End 2
end
delay

Throug
hput

Energy
consumption

Cost=
energy
*delay

50

0.515

11.31

0.379

0.195

100

0.714

12.37

0.384

0.274

150

0.910

12.62

0.382

0.347

200

1.01

13.1

0.383

0.386

Print-ISSN: 2231-2013 e-ISSN: 2231-0347

Table 3 Performance of Modified AIS-PEGASIS Protocol

Numbe
r
of
nodes

End 2
end
delay

Throug
hput

Energy
consumption

Cost=
energy
*delay

50

0.5000

11.51

0.369

0.184

100

0.696

12.69

0.373

0.259

150

0.890

13.0

0.372

0.331

200

0.99

13.2

0.373

0.369

This performance can be optimized by using the Modified


AIS PEGASIS. The performance of modified AIS-PEGASIS
is shown in table 3.
Table 1, table 2 and table 3 shows the performance of the
PEGASIS, AIS-PEGASIS and Modified AIS-PEGASIS
protocol over the network having 50,100,150 and 200 nodes
respectively. The graphs show that the energy consumption,
end 2 end delay and the cost of transmission has been
decreased in the Modified AIS-PEGASIS protocol as
compared to the AIS-PEGASIS or PEGASIS protocol.

Energy Consumption
0.4
E
n
e
r
g
y

0.39

PEGASIS

0.38
0.37

AIS-PEGASIS

0.36
0.35
50 100 150 200

Modified AISPEGASIS

Number of Nodes

End 2 End delay


1.2
E
1
n
0.8
d d 0.6
e 0.4
2 l
0.2
a
0
e y
n
d

PEGASIS
AIS-PEGASIS

50 100 150 200

Modified AISPEGASIS2

Number of Nodes

International Journal of Advances in Engineering Sciences vol 6 Issue 1 2016

COST=ENERGY*DELAY

[7] Saleem k, et al., Energy Efficient Information Assured


Routing based on Hybrid Optimization Algorithm for WSNs,
2013 10th International Conference on Information
Technology: New Generations.
[8]Dasgupta, Dipankar. "Advances in artificial immune
systems." Computational intelligence magazine, IEEE 1.4
(2006): 40-49

0.5

C 0.4
O
S 0.3
T
0.2

PEGASIS
Modified AISPEGASIS

0.1

AIS-PEGASIS2

0
50

[9]Borison, Herbert L. "The nervous system." Narcotic Drugs.


Springer US, 1971. 342-365.
[10] Xie D; Zhou Q; Liu J, A chain-based data gathering
protocol under compressive sensing framework for wireless
sensor networks, 2013 International Conference on
Computational and Information Sciences, 2013 IEEE DOI
10.1109/ICCIS.2013.390.

100 150 200

Number of Nodes
V. CONCLUSION
The work mainly focuses on the mapping of the human
body with the sensor network and implementation of the AIS
to enhance the network performance. This work proposes an
algorithm named Modified AIS-PEGASIS by introducing the
AIS in the PEGASIS algorithm. Modified AIS-PEGASIS is a
secure and efficient algorithm which can detect and recover
various network layer attacks. The simulation is done using
the MATLAB, and the results conforms the better
performance of Modified AIS-PEGASIS protocol as
compared to PEGASIS protocol. In future, the AIS can be
implementing on various other protocols of WSN to enhance
the network lifetime.

References
[1] Saleem k, et al., Energy Efficient Information Assured
Routing based on Hybrid Optimization Algorithm for WSNs,
2013 10th International Conference on Information
Technology: New Generations.
[2]Dasgupta, Dipankar. "Advances in artificial immune
systems." Computational intelligence magazine, IEEE 1.4
(2006): 40-49.
[3] Forrest, S. et al., "Self-nonself discrimination in a
computer" (PDF), Proceedings of the 1994 IEEE Symposium
on Research in Security and Privacy, Los Alamitos, CA. pp.
202212, (1994).
[4] Hunt, J. E. & Cooke, D. E., Learning Using an Artificial
Immune System, Journal of Network and Computer
Applications, 19, pp. 189-212, 1996
[5]Dasgupta, D., Artificial Neural Networks and Artificial
Immune Systems: Similarities and Differences, Proc. of the
IEEE SMC, 1, pp. 873-878, 1997.
[6]McCoy, D. F. & Devaralan, V., Artificial Immune
Systems and Aerial Image Segmentation, Proceedings of the
SMC97, pp. 867-872, 1997.

Print-ISSN: 2231-2013 e-ISSN: 2231-0347

You might also like