Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks



Similar documents
Security for Ad Hoc Networks. Hang Zhao

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Figure 1. The Example of ZigBee AODV Algorithm

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Technology Longowal, Punjab, India

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

A Catechistic Method for Traffic Pattern Discovery in MANET

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Securing MANET Using Diffie Hellman Digital Signature Scheme

A Survey on Load Balancing Techniques Using ACO Algorithm

Optimization of ACO for Congested Networks by Adopting Mechanisms of Flock CC

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

DAG based In-Network Aggregation for Sensor Network Monitoring

Development of cloud computing system based on wireless sensor network protocol and routing

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

Prediction of DDoS Attack Scheme

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Security Threats in Mobile Ad Hoc Networks

CHAPTER 1 INTRODUCTION

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

Journal of Theoretical and Applied Information Technology 20 th July Vol.77. No JATIT & LLS. All rights reserved.

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

An Active Packet can be classified as

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Performance Evaluation of Wired and Wireless Local Area Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks

Remote Home Security System Based on Wireless Sensor Network Using NS2

A Fast Path Recovery Mechanism for MPLS Networks

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

An Improved ACO Algorithm for Multicast Routing

Improved Termite Hill Routing Protocol using ACO in WSN

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Monitoring behavior-based Intrusion Detection System for 6loWPAN networks

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

Demystifying Wireless for Real-World Measurement Applications

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

LIST OF FIGURES. Figure No. Caption Page No.

Wireless Sensor Network: Challenges, Issues and Research

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Influences of Communication Disruptions on Decentralized Routing in Transport Logistics

Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm

TOPOLOGIES NETWORK SECURITY SERVICES

Wireless Sensor Networks Chapter 14: Security in WSNs

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

Transcription:

2015 12th International Conference on Information Technology - New Generations Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks Kashif Saleem Abdelouahid Derhab Center of Excellence in Information Assurance (CoEIA) King Saud University (KSU), Riyadh Kingdom of Saudi Arabia (KSA) {ksaleem, abderhab}@ksu.edu.sa Mehmet A. Orgun Intelligent Systems Group (ISG) Department of Computing Macquarie University NSW 2109, Australia mehmet.orgun@mq.edu.au Jalal Al-Muhtadi Center of Excellence in Information Assurance (CoEIA), College of Computer and Information Sciences (CCIS), King Saud University (KSU), Riyadh, Kingdom of Saudi Arabia (KSA) jalal@ccis.edu.sa Abstract Wireless Sensor Networks (WSNs) are often deployed in remote and hostile areas and because of their limited power and vulnerability, the sensors may stop functioning after sometime leading to the appearance of holes in a network. A hole created by the non-functioning sensors in turn severs the connection between one side and the other side of the network and alternative routes need to be found for the network traffic. Prior research tackled the holes problem only when packets reach some nodes near the hole. In this case, the feedback packets are generated and accordingly the data packets need to be rerouted to avoid the holes. The traffic overhead for rerouting consumes additional battery power and thus increases the communication cost as well as reducing the lifetime of the sensors. To deal with the dynamical changes in network topologies in an autonomous manner, ant colony optimization (ACO) algorithms have shown very good performance in routing the network traffic. In this paper, we analyze the scalability and stability of the ACO-based routing protocol BIOSARP against the issues caused by holes in WSNs. Network simulator 2 (ns-2) is utilized to perform the analysis. Findings clearly demonstrate that BIOSARP can efficiently maintain the data packet routing over a WSN prior to any possible holes problems, by switching data forwarding to the most optimal neighboring node. Keywords Autonomous; Energy; Fault tolerance; Holes Issues; Routing protocols; Scalability; Wireless sensor networks I. INTRODUCTION Wireless sensor networks (WSNs) are meant to work independently and intelligently, because these kind of networks are mostly deployed in areas that are out of human reach. Generally, most low-power wireless networks usually have unreliable links with limited bandwidth and their link quality can also be heavily influenced by environmental factors [1]. In WSNs, network anomalies such as holes are caused by the limited power and limited lifetime of the deployed sensors are among the most common and critical problems. Regions effected by the holes are a set of nodes or an area that prevent data from being transferred from one side of network to another side. The holes appear due to inactivity periods, vulnerability to destruction and battery power depletion, link quality, network attacks, physical disasters, etc. [2, 3]. Most commonly known types of the holes problem are jamming holes, sink/black holes/worm holes, coverage holes and routing holes [2]. Due to the holes problem the sink node could not receive important information and that effects overall communication of the network and in some cases even the complete network goes offline, which results in huge loss [4]. Nature inspired algorithms [5] are shown to provide highly robust, self-organizing and autonomous systems to tackle holes problems in WSN. Routing protocols designed for WSNs should intelligently distribute the energy over the network to provide maximum lifetime with efficient network performance [2]. In biological inspired autonomous systems ACO algorithms are a class of constructive meta-heuristic algorithms that mimic the cooperative behavior of real ants to achieve complex computations and have been proven to be very efficient to many different discrete optimization problems [6]. Ant Colony Optimization (ACO) is widely used to solve difficult combinatorial optimization problems such as the ACO meta-heuristic, the quadratic assignment problem (QAP), and the traveling salesman problem (TSP) [7]. Due to nature inspired characteristics of the ACO algorithms, such as collaboration, cooperation, distributed computation and stochastic search, ACO is particularly suitable for scalability, robustness and suitability for dynamic environments. Based on the aforementioned advantages, ACO algorithms have received much attention in network applications. In this paper, we show that the recent improved ACO based Biological Inspired Secure Autonomous Routing Protocol (BIOSARP) [8] for WSNs can overcome the above mentioned holes problems [9]. In [8, 9], the authors have developed an improved ant colony optimization (IACO) algorithm to acquire optimal route decisions and artificial immune system (AIS) to detect abnormalities. The autonomous routing protocol BIOSARP depends on the probabilistic value called as pheromone value of neighboring nodes stored in a routing table. The pheromone value is calculated based on the Sincerest gratitude to Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Kingdom of Saudi Arabia. 978-1-4799-8828-0/15 $31.00 2015 IEEE DOI 10.1109/ITNG.2015.44 234

remaining battery power, end to end delay, and packet reception rate (PRR) based on signal to noise ratio (SNR). These parameters are updated periodically in maintaining the regional knowledge in the network. BIOARP has shown an improved performance as compared to LQER, MM-SPEED, RPAR, RTPC, and RTLD [10]. With respect to security, BIOSARP has less processing time, and provides more efficient security measures over TinySec-AE, TinySec-Auth, TinyHash, LBRS-Auth, EBSS, SRTLD, and SPINS [11]. However, BIOSARP has not been studied extensively under networks anomalies such as the holes problem. Previously, we have analyzed the behavior and performance of BIOSARP in [12] to tackle the holes problems with and without a feedback mechanism. The analysis has shown that BIOSARP can reroute the network traffic effectively when the holes appear in a typical WSN configuration. In this paper, we extend the analysis to the study of the scalability and stability of BIOSARP to handle the holes problem. That is, we study the performance of BIOSARP under network topologies with an increasingly larger number of sensor nodes as well as an increasingly larger number of holes. Finally, the results of BIOSARP are compared with a recent state of the art routing protocol, ERTLD, in terms of packet delivery ratio, battery power, and data packet overhead. The paper is structured as follows. Ssection II reviews the related literature and BIOSARP. Section III presents the approach to the analysis of BIOSARP. The implementation, results and comparison are given in Section IV. Section V states the conclusions and future work. II. RELATED WORK In [13], the authors have used ACO to solve the state justification problem and shown its capability to avoid deadend states in sequential circuits. Later in [14], to reduce the state explosion problem that arises because of deadlocks in complex networks, the authors have used the ACO algorithm. They have evaluated their given technique on several benchmarks; it is shown that the ACO algorithm performs better over other heuristic-based search strategies. In WSNs, the utilization of the ACO algorithm to specifically handle holes problems or dead-ends has been discussed in [12]. The authors have shown that the ACO algorithm is promising in avoiding holes and rerouting the network traffic but it remains to be seen whether the ACO algorithm could scale up to larger networks and/or larger numbers and sizes of holes that are typical in real applications of WSNs. Below we discuss some recent ACO based routing protocols for WSNs. In [15], the author have proposed a routing protocol for Mobile WSN (MWSN) called Enhanced RealTime with Load Distribution (ERTLD), which is based on real-time load distribution (RTLD)[16]. In ERTLD, the author has additionally utilized a corona mechanism to forward the data packets to their destination. The ERTLD protocol has been compared with baseline routing protocols of RTLD, RACE, and MM-Speed [15]. The author claims that ERTLD gives better delivery ratio while minimizing end-to-end delay in MWSN and WSN. Saleem et al. [8] have proposed the improved ACO based routing protocol BIOSARP. The given ACO based routing mechanism reduces the cost of the broadcast function for neighbor discovery at every hop. To avoid a huge traffic overhead, the BIOSARP ACO function is designed with only two agents: Search Ant and Data Ant. The Data Ant selects the next forwarding node based on the pheromone value calculated and stored in the neighbor table. The Data Ant (data packet) moves hop by hop towards the destination by selecting the optimal pheromone values from the neighbor table. The routing management will forward a data packet to the neighbor that has an optimal pheromone value Best p k cv(t). While forwarding, the current node looks for the sink node id in the neighbor table. If the sink node is found, it forwards the data packet to the sink. Otherwise, it looks for an optimal pheromone value in the neighbor table. BIOSARP keeps track of all possible routes over per hop basis via pheromone values stored in the neighbor table of every neighboring node. Moreover, BIOSARP has a security management module on top of autonomous routing [17]. The security module of BIOSARP is based on the artificial immune system (AIS). Preventive measures based on the AIS mechanism [17] and reactive measures are based on a random key encryption mechanism [11]. The BIOSARP routing mechanism is validated by experimentation performed under TOSSIM and later implemented in TinyViz by using 10 TELOSB motes [18]. BIOSARP has shown better performance over the state of art routing protocols for WSNs. The consumption of resources is reduced by avoiding rediscoveries, replies and recalculations. Above mentioned algorithms, except BIOSARP, maintain the best path knowledge by knowing all node ids until the destination and then transfer the data packets directly. In BIOSARP, the improved ACO [8] is adapted to perform autonomous routing in WSNs. BIOSARP, rather than wasting resources on forward and backward agents, starts transferring data hop by hop and deposits pheromone values in routing table on the way. To handle the holes problem, the other routing protocols require huge and complex mathematical computations that generate a huge data packet overhead and consume extra battery power due to the involvement of additional processing. III. APPROACH TO PERFORMANCE ANALYSIS A well-known problem is the failure of finding routes when forwarding data packets in WSN. It occurs due to the existence of holes in the network and can be there even after neighbor discovery. The presence of holes may appear because of the large gaps in between nodes or attacks or due to the inactive nodes. Our objective to analyze the performance of BIOSARP and ERTLD by implementing them in the ns-2 environment. We configure a WSN model in the network simulator 2 (ns-2) with 121 and 49 nodes distributed in 80m x 80m grid topology as shown in Fig.1 (a) and (b). Holes are introduced in the configured WSN by initializing certain nodes with lower energy level and setting some other nodes to perform jamming attacks by sending unauthentic packets as shown in Fig.1 (a) and (b). 235

(a) Fig. 1. (a) Small density WSN, (b) Large density WSN (Sink node is in Red, Source nodes are in Blue, and Malicious nodes are in Purple) We examine the behavior of data routing by BIOSARP while increasing the number of nodes causing the holes from 4, 8, and 12 in small density WSNs and from 10, 20, and 30 in large density WSNs. Furthermore, BIOSARP is compared with state of the art routing protocol ERTLD [15] in terms of delivery ratio, energy consumption and data packet overhead. We inspect the state of the routing problem handler to analyze BIOSARP with respect to routing holes as shown in Fig.1 (a) and (b). When a sensor node receives a data packet to forward from its parent, it looks for the sink in its neighbor table. If the sink is found in its neighbor table, the current node forwards the data packet directly to the sink. If the sink node id is not found, then it calculates the next optimal node based on the values available in the neighbor table and forwards the data packet. In the case where the next node could not be found, the neighbor rediscovery is invoked. The neighbor rediscovery function searches other neighboring nodes to find a route to the sink. The holes problem occurs due to a defective region and nodes given in Fig.1 (a) and (b) in purple color. IV. IMPLEMENTATION AND ANALYSIS In this section, the self-adaptive behavior of BIOSARP is explained through simulation implementation and results. The ns-2 based simulation has been conducted to simulate a WSN model with 121 and 49 nodes distributed in 80m x 80m grid topology. MAC and physical layer of IEEE 802.15.4 have been embedded in the WSN model to function similar to the MICAz motes. The end-to-end deadline was fixed at 250 ms and (b) simulation time at 400s, while the traffic load has been varied from 1 to 10 packet/s. The network model as shown in Fig. 1 (a) and (b), is configured based on the IEEE 802.15.4 standard. All nodes are homogenous except malicious nodes that are enabled and the number of malicious nodes is increased gradually in the next simulation. While simulating the malicious node, they are initialized with 0.9J and some nodes perform jamming attacks periodically. Under large density, 90, 100, 110 and 120 are the source nodes and node 0 is the sink node. Under small density, 37, 43, 31 and 25 are the source nodes and node 0 is the sink node. The simulations are done in six categories that are based on the node density, and in every category the packet rate per second varies from 1.16, 1.86, 4.22, 6.17, 7.3, and 9.6. In the first category, a small density WSN with 49 nodes, simulation is performed with 4 malicious nodes (1, 3, 5, 7), and then in the next category of simulation, 4 more malicious nodes are added (10, 18, 21, 23), and in the third category further 4 malicious nodes are added (20, 12, 15, 13). In the end, there are a total of 12 malicious nodes as shown in Fig.1 (a). Furthermore, the large density WSN is configured with 121 nodes and simulation is performed by involving 10 malicious nodes (22, 4, 14, 6, 16, 2, 24, 8, 7, 5) in the fourth category. In the fifth category simulation, 10 malicious nodes are added (35, 37, 39, 41, 43, 45, 47, 31, 29, 27), and in the last category simulation, 10 more malicious nodes (33, 64, 68, 72, 76, 80, 56, 52, 58, 64) are added to make a total of 30 malicious nodes as shown in Fig.1 (b). A. BIOSARP routing in the presence of holes problems In order to show the effect of BIOSARP, one of the scenarios has been utilized as shown in Fig. 2. Initially, BIOSARP avoids the nodes that are non-self and secondly the nodes with less resources that can cause holes in the near future. While routing data, the next neighboring node or forwarding node is selected, based on the pheromone value calculated through a probabilistic rule. The data packets can flow through a path chosen by BIOSARP; the path is from source 37 to nodes 31, 29, 6, and 0. That means these nodes get the best pheromone values and provide the best performance, as compared to other neighboring nodes. With the continuous usage of the node id 29, the performance declines in terms of the remaining battery power. Fig. 2. BIOSARP switches to node with id 30 at 206.8509 seconds and the blue path continues 236

The energy consumption is also very little by BIOSARP as compared to the energy consumption by ERTLD. With respect to data packet overhead, BIOSARP generates very few control packets compared to ERTLD in the presence of 30 malicious nodes. This is because the protocol selects the most optimal neighboring self-node to transfer the data packet towards the destination. Hence, the results demonstrate that BIOSARP can avoid holes in the network and can efficiently route the data packets even in presence of the holes problem. 80 75 70 Fig. 3. The switching of nodes while routing data DELIVERY RATIO 65 60 Accordingly, the pheromone value also drops because it is calculated based on the remaining battery power. At the time of forwarding, if node 31 finds a node with a better pheromone value, it selects it as optimal and starts forwarding to that particular node. Similarly, as shown in Fig. 2 and Fig. 3, when the simulation time is 206.8509 seconds, the path changes to nodes 31, 30, 28, 6, and 0. Node 31 starts to forward the data towards node 30, and then node 30 checks its neighbor table and finds node id 28. The data finally reaches to node 0 via node 6. The data forwarding continues on this path, until the parent node finds a node with a better pheromone value in its neighboring table. B. Results Comparison and Discussion This section shows the results obtained from the scenarios implemented in ns-2 and the comparisons. The results in Fig. 4 show that, in a small density network with the maximum number of malicious nodes, BIOSARP gives up to 79% delivery ratio and even in a large density network with the maximum number of malicious nodes, it maintains the delivery ratio of up to 60%. While maintaining the delivery ratio, the energy consumption goes higher as shown in Fig.5, but without any malicious activity (or without any holes), the energy consumption is very little. Moreover, in the presence of malicious nodes, the data packet overhead grows, because of more handshakes and thus more control packets are generated as shown in Fig. 6. Furthermore, BIOSARP is compared with state of the art routing protocol ERTLD to compare their performance. The scenarios are configured with a large density WSN and simulations are conducted in the presence of 30 malicious nodes and as well without any malicious activity. Fig. 7 shows that the delivery ratio given by BIOSARP is far better than ERTLD even in the presence of malicious nodes. 55 50 45 Fig. 4. Delivery Ratio ENERGY CONSUMPTION 165 145 125 105 85 65 45 25 5 49 Nodes with 0 Malicious 49 Nodes with 4 Malicious 49 Nodes with 8 Malicious 49 Nodes with 12 Malicious 121 Nodes with 0 Malicious 121 Nodes with 10 Malicious 121 Nodes with 20 Malicious 121 Nodes with 30 Malicious Fig. 5. Energy Consumption 49 Nodes with 0 Malicious 49 Nodes with 4 Malicious 49 Nodes with 8 Malicious 49 Nodes with 12 Malicious 121 Nodes with 0 Malicious 121 Nodes with 10 Malicious 121 Nodes with 20 Malicious 121 Nodes with 30 Malicious 237

DATA PACKET OVERHEAD 12 10 8 6 4 2 49 Nodes with 0 Malicious 49 Nodes with 4 Malicious 49 Nodes with 8 Malicious 49 Nodes with 12 Malicious 121 Nodes with 0 Malicious 121 Nodes with 10 Malicious 121 Nodes with 20 Malicious 121 Nodes with 30 Malicious DATA PACKET OVERHEAD 90 80 70 60 50 40 30 ERTLD - 121 Nodes with 0 Malicious ERTLD - 121 Nodes with 30 Malicious BIOSARP - 121 Nodes with 0 Malicious BIOSARP - 121 Nodes with 30 Malicious 20 0 Fig. 6. Data Packet Overhead DELIVERY RATIO 75 65 55 45 35 25 15 1.16 1.86 4.22 6.17 7.3 9.6 Fig. 7. Delivery Ratio of BIOSARP and ERTLD ENERGY CONSUMPTION 200 180 160 140 120 100 80 60 40 20 0 ERTLD - 121 Nodes with 0 Malicious ERTLD - 121 Nodes with 30 Malicious BIOSARP - 121 Nodes with 0 Malicious BIOSARP - 121 Nodes with 30 Malicious ERTLD - 121 Nodes with 0 Malicious Fig. 8. Energy Consumption of BIOSARP and ERTLD ERTLD - 121 Nodes with 30 Malicious BIOSARP - 121 Nodes with 0 Malicious BIOSARP - 121 Nodes with 30 Malicious 10 0 Fig. 9. Data Packet Overhead of BIOSARP and ERTLD V. CONCLUSION AND FUTURE WORK In this article, we have analyzed the scalability and stability of ant colony optimization (ACO) based routing protocol BIOSARP to handle the holes issues in WSNs. The WSN scenario with holes problems is configured in the network simulator 2 (ns-2) to compare the performance of BIOSARP with state of art routing protocol ERTLD. The results show that BIOSARP can tackle holes problems effectively and offers a scalable and stable solution. In particular, the comparison shows that BIOSARP maintains the network performance, even in the presence of holes, in terms of delivery ratio, battery power consumption, and data packet overhead. Hence, BIOSARP is capable of handling the routing problems caused by holes in advance. The analysis reveals that BIOSARP can self-adapt to the dynamical changes in the network topology. Our immediate future work is to enhance the routing protocol with IPv6 and mobility factors to come up with mobile internet protocol 6 (MIPv6) for WSN. ACKNOWLEDGMENT The authors are grateful to the anonymous reviewers for their valuable comments and suggestions that helped improve the presentation of this paper. REFERENCES [1] A. Cerpa, J. L. Wong, L. Kuang, M. Potkonjak, and D.Estrin, "Statistical Model of Lossy Links in Wireless Sensor Networks," in ACM/IEEE IPSN, Los Angeles, USA, 2005. [2] N. Ahmed, S. S. Kanhere, and S. Jha, "The holes problem in wireless sensor networks: a survey," SIGMOBILE Mob. Comput. Commun. Rev., vol. 9, pp. 4-18, 2005. [3] T. He, J. Stankovic, C. Lu, and T. Abdelzaher, "SPEED: A stateless protocol for real-time communication in sensor networks," in 23rd International Conference on Distributed Computing Systems, Providence, Rhode Island, USA, 2003, pp. 46-55. [4] P. K. Singh and G. Sharma, "An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET," in Trust, Security and 238

Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, 2012, pp. 902-906. [5] E. Patouni, D. Kypriadis, and N. Alonistioti, "A lightweight framework for prediction-based resource management in future wireless networks," EURASIP Journal on Wireless Communications and Networking, vol. 2012, p. 144, 2012. [6] B. Zhang, Y. Wu, J. Lu, and K.-L. Du, "Evolutionary Computation and Its Applications in Neural and Fuzzy Systems," Applied Computational Intelligence and Soft Computing, vol. 2011, pp. 1-20, 2011. [7] G. Chen, T.-D. Guo, W.-G. Yang, and T. Zhao, "An improved ant-based routing protocol in Wireless Sensor Networks," in Collaborative Computing: International Conference on Networking, Applications and Worksharing, 2006. CollaborateCom 2006., New York, NY, 2006, pp. 1-7. [8] K. Saleem and N. Fisal, "Enhanced Ant Colony algorithm for selfoptimized data assured routing in wireless sensor networks," in Networks (ICON), 2012 18th IEEE International Conference on, 2012, pp. 422-427. [9] M. Adnan, M. Razzaque, I. Ahmed, and I. Isnin, "Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey," Sensors, vol. 14, pp. 299-345, 2013. [10] K. Saleem and N. Fisal, "Energy Efficient Information Assured Routing Based on Hybrid Optimization Algorithm for WSNs," in Proceedings of the 2013 10th International Conference on Information Technology: New Generations, 2013, pp. 518-524. [11] K. Saleem, M. S. Khalil, N. Fisal, A. A. Ahmed, and M. A. Orgun, "Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs," in IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2013), Melbourne, Australia, 2013, pp. 1662-1668. [12] K. Saleem, A. Derhab, J. Al-Muhtadi, and M. A. Orgun, "Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user s connectivity experience," Computers in Human Behavior. doi:10.1016/j.chb.2014.11.030 [13] L. Min and M. S. Hsiao, "An ant colony optimization technique for abstraction-guided state justification," in Test Conference, 2009. ITC 2009. International, 2009, pp. 1-10. [14] G. Francesca, A. Santone, G. Vaglini, and M. L. Villani, "Ant Colony Optimization for Deadlock Detection in Concurrent Systems," in Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th Annual, 2011, pp. 108-117. [15] A. Ali Ahmed, "An enhanced real-time routing protocol with load distribution for mobile wireless sensor networks," Computer Networks, vol. 57, pp. 1459-1473, 2013. [16] A. A. Ahmed and N. F. Fisal, "Secure real-time routing protocol with load distribution in wireless sensor networks," Security and Communication Networks, vol. 4, pp. 839-869, Aug. 2011. [17] K. Saleem, N. Fisal, S. Hafizah, and R. Rashid, "An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP," in Computational Intelligence in Security for Information Systems. vol. 6694, Á. Herrero and E. Corchado, Eds., ed: Springer Berlin / Heidelberg, 2011, pp. 118-126. [18] K. Saleem, N. Fisal, and J. Al-Muhtadi, "Empirical Studies of Bio- Inspired Self-Organized Secure Autonomous Routing Protocol," Sensors Journal, IEEE, vol. 14, pp. 2232-2239, 2014. 239