I. J. Computer Network and Information Security, 2017, 12, 36-44 Published Online December 2017 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2017.12.05 Copyright © 2017 MECS I.J. Computer Network and Information Security, 2017, 12, 36-44 Monitoring of Military Base Station using Flooding and ACO Technique: An Efficient Approach Abdus Samad University Women’s Polytechnic, F/O Engg. & Tech., AMU, Aligarh, India E-mail: asamad.uwp@amu.ac.in Mohammed Shuaib Dept. of Computer Science, Jazan University, Jazan, KSA E-mail: talkshuaib@gmail.com Mohd Rizwan Beg R B Group of Institutions (RBGI), Agra, India E-mail: rizwanbeg@gmail.com Received: 22 January 2016; Accepted: 12 September 2017; Published: 08 December 2017 AbstractRapid development of Wireless sensor network led to applications ranging from industry to military fields. These sensors are deployed in the military base station such as battlefield surveillances. The important issues like security & DoS attacks play crucial role for wireless sensor network. Due to the limitations of resources, traditional security scheme cannot be employed efficiently. Therefore, designing a framework that can operate securely using smart intelligence technique is the best option. In this paper, an efficient way of detecting an intrusion using Flooding and Ant colony is proposed. The flooding technique enables the master agents to track the activity of intruder tampering the part of the network. The ACO identifies the path followed by the nodes and also the intruder, who wants to jam the whole wireless sensor network. The architecture strategically enables the Bait agents to detect the intruders threatening the network. The proposed framework is designed for the military station. It helps the base station to detect the intrusion and decide whether the activity is normal or terrestrial and send the signal to the nearest missile station situated near the intrusion location and destroy it in minimum time. The process of detecting the intrusion earlier not only helps to learn future attacks, but also a defense counter measures. Index TermsBait agent, Master agent, Intrusion detection, Flooding Ant Colony, Intrusion detection, DoS attack. I. INTRODUCTION Protection and security of the network is the main goal of the researchers and several researches in this direction have been reported in the literature. The various approaches include the potential of Artificial Intelligence, incorporating the biological system such as ACO and detection and defense from the DoS attacks [1], [2], [3]. The security of ground base station is one of the major area where different system of systems (SoS) architectures are applied; a set of independent heterogeneous networked systems cooperate for a common goal [4]. These SoS architectures consists of minimum a Base Station, a set of launchers and at least one sensor with a base station monitoring Unit. These units integrate all Command, Control, Computing, Communications and Intelligence [3], [5]. The wireless sensor network (WSN) consists of a number of spatially distributed nodes that consist of sensors, processing elements and low power radio channels that provide wireless communication with each other as well as with the base station. The base station has larger power with high data rate as compared to sensor nodes. However, sensor node perform specific task for which they are designed at a particular location. The base station on the other hand plays the greater role and performs operation such as information gathering, node activation and networks. They also provide interface with other sensor networks. The advantages of WSNs technologies are remarkable that provide in an expansive way to install a network and greatly contributed worldwide in WSNs applications [6]. The military application such as battlefield is an important example where WSNs are widely used. Generally, thousands of sensor node connectivity work to sense various physical and environment characteristics. These sensors are arranged in the form of various clusters. Each cluster has a root node with a set of sensor. The cluster communicates well each other through route node