I. J. Computer Network and Information Security, 2017, 12, 36-44
Published Online December 2017 in MECS (http://www.mecs-press.org/)
DOI: 10.5815/ijcnis.2017.12.05
Copyright © 2017 MECS I.J. Computer Network and Information Security, 2017, 12, 36-44
Monitoring of Military Base Station using
Flooding and ACO Technique: An Efficient
Approach
Abdus Samad
University Women’s Polytechnic, F/O Engg. & Tech., AMU, Aligarh, India
E-mail: asamad.uwp@amu.ac.in
Mohammed Shuaib
Dept. of Computer Science, Jazan University, Jazan, KSA
E-mail: talkshuaib@gmail.com
Mohd Rizwan Beg
R B Group of Institutions (RBGI), Agra, India
E-mail: rizwanbeg@gmail.com
Received: 22 January 2016; Accepted: 12 September 2017; Published: 08 December 2017
Abstract—Rapid development of Wireless sensor
network led to applications ranging from industry to
military fields. These sensors are deployed in the military
base station such as battlefield surveillances. The
important issues like security & DoS attacks play crucial
role for wireless sensor network. Due to the limitations of
resources, traditional security scheme cannot be
employed efficiently. Therefore, designing a framework
that can operate securely using smart intelligence
technique is the best option. In this paper, an efficient
way of detecting an intrusion using Flooding and Ant
colony is proposed. The flooding technique enables the
master agents to track the activity of intruder tampering
the part of the network. The ACO identifies the path
followed by the nodes and also the intruder, who wants to
jam the whole wireless sensor network. The architecture
strategically enables the Bait agents to detect the
intruders threatening the network. The proposed
framework is designed for the military station. It helps
the base station to detect the intrusion and decide whether
the activity is normal or terrestrial and send the signal to
the nearest missile station situated near the intrusion
location and destroy it in minimum time. The process of
detecting the intrusion earlier not only helps to learn
future attacks, but also a defense counter measures.
Index Terms—Bait agent, Master agent, Intrusion
detection, Flooding Ant Colony, Intrusion detection, DoS
attack.
I. INTRODUCTION
Protection and security of the network is the main goal
of the researchers and several researches in this direction
have been reported in the literature. The various
approaches include the potential of Artificial Intelligence,
incorporating the biological system such as ACO and
detection and defense from the DoS attacks [1], [2], [3].
The security of ground base station is one of the major
area where different system of systems (SoS)
architectures are applied; a set of independent
heterogeneous networked systems cooperate for a
common goal [4]. These SoS architectures consists of
minimum a Base Station, a set of launchers and at least
one sensor with a base station monitoring Unit. These
units integrate all Command, Control, Computing,
Communications and Intelligence [3], [5].
The wireless sensor network (WSN) consists of a
number of spatially distributed nodes that consist of
sensors, processing elements and low power radio
channels that provide wireless communication with each
other as well as with the base station. The base station has
larger power with high data rate as compared to sensor
nodes. However, sensor node perform specific task for
which they are designed at a particular location. The base
station on the other hand plays the greater role and
performs operation such as information gathering, node
activation and networks. They also provide interface with
other sensor networks. The advantages of WSNs
technologies are remarkable that provide in an expansive
way to install a network and greatly contributed
worldwide in WSNs applications [6]. The military
application such as battlefield is an important example
where WSNs are widely used.
Generally, thousands of sensor node connectivity work
to sense various physical and environment characteristics.
These sensors are arranged in the form of various clusters.
Each cluster has a root node with a set of sensor. The
cluster communicates well each other through route node