Research Article Web Spider Defense Technique in Wireless Sensor Networks Alejandro Canovas, 1 Jaime Lloret, 1 Elsa Macias, 2 and Alvaro Suarez 2 1 Integrated Management Coastal Research Institute, Universidad Polit´ ecnica de Valencia, Spain 2 Departamento de Ingenier´ ıa Telem´ atica, Universidad de Las Palmas de Gran Canaria, Spain Correspondence should be addressed to Alejandro Canovas; alcasol@posgrado.upv.es Received 22 April 2014; Accepted 1 July 2014; Published 23 July 2014 Academic Editor: S. Khan Copyright © 2014 Alejandro Canovas et al. Tis is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Wireless sensor networks (WSNs) are currently widely used in many environments. Some of them gather many critical data, which should be protected from intruders. Generally, when an intruder is detected in the WSN, its connection is immediately stopped. But this way does not let the network administrator gather information about the attacker and/or its purposes. In this paper, we present a bioinspired system that uses the procedure taken by the web spider when it wants to catch its prey. We will explain how all steps performed by the web spider are included in our system and we will detail the algorithm and protocol procedure. A real test bench has been implemented in order to validate our system. It shows the performance for diferent response times, the CPU and RAM consumption, and the average and maximum values for ping and tracert time responses using constant delay and exponential jitter. 1. Introduction A wireless sensor network (WSN) is distributed in nature. It consists of several electronic devices with a memory, a pro- cessor, and one or more elements that sense the environment [1, 2]. One of their main issues taken into account in their deployment is their power limitation and their need to save energy [3, 4]. Sensor nodes can communicate among them using a particular or standard communication technology network interface card. Te sensed values can be forwarded to a central manager that usually is a computer (or similar device). Te computer allocates a manager that is in charge to manage the WSN. Te most common strategy to read values of sensed elements consists of interrogating the manager in order to obtain a set of sensed values. In this sense, a WSN is used to collect and monitor the related information about a specifc environment. Tis procedure has relevance in several cases: vigilance, oceanographic values of a strategic installation, police related information, and many more. Generally, WSNs are used to sense private data. Some of them can also transmit critical data. Tus, it is very important to secure the collection of data and detect and avoid external intrusions. An intruder may be able to access unauthorized data, spread erroneous data and/or malicious code, implement unauthorized changes to data or sensor sofware, or steal data. Moreover, an intruder could initiate attacks to the network from that sensor node and open new doors to other intruders. Tis must be done taking into consideration four requirements: data confdentiality, data authentication, data integrity, and denial-of-service (DoS) attack avoidance [5]. Diferent surveys on WSN security are presented in [613]. In [14, 15] a list of attacks and counterattacks are surveyed. Tis work is focused on intrusion attacks in WSNs. A network intrusion detection system (IDS) is an essential element in a computer security strategy [16]. An IDS is a device or a sofware application that monitors network and system activities for malicious activities or policy violations. Te IDS produces reports to a central system that allow humans to intervene or that can be responded by computer systems in an attempt to stop the intrusion. In a WSN, this attack means that an attacker (malicious user) wants to illegally read the data sensed by a set of sensors. We suppose the malicious user can interrogate the sensors in the WSN bypassing the control of the WSN manager/administrator. Te difcult task here is to discover when a malicious attack is Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2014, Article ID 348606, 7 pages http://dx.doi.org/10.1155/2014/348606