Skip to main content

2022 | OriginalPaper | Buchkapitel

Improving the Protection of Wireless Sensor Network Using a Black Hole Optimization Algorithm (BHOA) on Best Feasible Node Capture Attack

verfasst von : Ankur Khare, Rajendra Gupta, Piyush Kumar Shukla

Erschienen in: IoT and Analytics for Sensor Networks

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless Sensor Network (WSN) is an area of research that connects mutually huge subareas of communication, routing, security, and attacks. WSN is conceivably the most susceptible network to node capture attack due to its dynamic nature in huge area. A node capture attack is introduced by seizing few nodes through an intruder to capture entire WSN by extracting the useful information like keys, routing mechanism, and data from WSN. To improve the protection of WSN, we proposed a Black Hole Optimization Algorithm (BHOA) on best feasible node capture attack to discover the optimal nodes having superior possibility of attack. The BHOA is applied on a function Vertex Participation. The experiment is performed on MATLAB 2019a environment, and the results show the better quality, efficiency of BHOA against MA, OGA, MREA, GA, and FFOA based on traffic compromised ratio, power consumption cost, and attacking time.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Shaukat, H. R., Hashim, F., Shaukat, M. A., & Alezabi, K. A. (2020). Hybrid multi-level detection and mitigation of clone attacks in mobile wireless sensor network (MWSN). Sensors, MDPI, 20, 1–23.CrossRef Shaukat, H. R., Hashim, F., Shaukat, M. A., & Alezabi, K. A. (2020). Hybrid multi-level detection and mitigation of clone attacks in mobile wireless sensor network (MWSN). Sensors, MDPI, 20, 1–23.CrossRef
3.
Zurück zum Zitat Chowdary, K., & Satyanarayana, K. V. V. (2017). Malicious node detection and reconstruction of network in sensor actor network. Journal of Theoretical and Applied Information Technology, 95(3), 582–591. Chowdary, K., & Satyanarayana, K. V. V. (2017). Malicious node detection and reconstruction of network in sensor actor network. Journal of Theoretical and Applied Information Technology, 95(3), 582–591.
4.
Zurück zum Zitat Ehdaie, M., Alexiou, N., Ahmadian, M., Aref, M. R., & Papadimitratos, P. (2017). Mitigating node capture attack in random key distribution schemes through key deletion. Journal of Communication Engineering, 6(2), 1–10. Ehdaie, M., Alexiou, N., Ahmadian, M., Aref, M. R., & Papadimitratos, P. (2017). Mitigating node capture attack in random key distribution schemes through key deletion. Journal of Communication Engineering, 6(2), 1–10.
6.
Zurück zum Zitat Ahlawat, P., & Dave, M. (2018). An attack resistant key predistribution scheme for wireless sensor Networks. Journal of King Saud University—Computer and Information Sciences, Elsevier, 1–13. Ahlawat, P., & Dave, M. (2018). An attack resistant key predistribution scheme for wireless sensor Networks. Journal of King Saud University—Computer and Information Sciences, Elsevier, 1–13.
9.
Zurück zum Zitat Lin, C., Qiu, T., Obaidat, M. S., Yu, C. W., Yao, L., & Wu, G. (2016). MREA: A minimum resource expenditure node capture attack in wireless sensor networks. Security and Communication Networks, Wiley Online Library, 9, 5502–5517. https://doi.org/10.1002/sec.1713.CrossRef Lin, C., Qiu, T., Obaidat, M. S., Yu, C. W., Yao, L., & Wu, G. (2016). MREA: A minimum resource expenditure node capture attack in wireless sensor networks. Security and Communication Networks, Wiley Online Library, 9, 5502–5517. https://​doi.​org/​10.​1002/​sec.​1713.CrossRef
10.
Zurück zum Zitat Bhatt, R., Maheshwary, P., Shukla, P., Shukla, P., Shrivastava, M., & Changlani, S. (2020). Implementation of fruit fly optimization algorithm (FFOA) to escalate the attacking efficiency of node capture attack in wireless sensor networks (WSN). Computer Communications, Elsevier, 149, 134–145.CrossRef Bhatt, R., Maheshwary, P., Shukla, P., Shukla, P., Shrivastava, M., & Changlani, S. (2020). Implementation of fruit fly optimization algorithm (FFOA) to escalate the attacking efficiency of node capture attack in wireless sensor networks (WSN). Computer Communications, Elsevier, 149, 134–145.CrossRef
11.
Zurück zum Zitat Shukla, P. K., Goyal, S., Wadhvani, R., Rizvi, M. A., Sharma, P., & Tantubay, N. (2015). Finding robust assailant using optimization functions (FiRAO-PG) in wireless sensor network. Hindawi Publishing Corporation, Mathematical Problems in Engineering, 1–8. https://doi.org/10.1155/2015/594345. Shukla, P. K., Goyal, S., Wadhvani, R., Rizvi, M. A., Sharma, P., & Tantubay, N. (2015). Finding robust assailant using optimization functions (FiRAO-PG) in wireless sensor network. Hindawi Publishing Corporation, Mathematical Problems in Engineering, 1–8. https://​doi.​org/​10.​1155/​2015/​594345.
12.
Zurück zum Zitat Molina, D., Poyatos, J., Ser, J. D., Garcia, S., Hussain A., & Herrera, F. (2020). Comprehensive taxonomies of nature- and bio-inspired optimization: inspiration versus algorithmic behavior. Critical Analysis and Recommendations. cs.AI, pp. 1–76. arXiv:2002.08136v2. Molina, D., Poyatos, J., Ser, J. D., Garcia, S., Hussain A., & Herrera, F. (2020). Comprehensive taxonomies of nature- and bio-inspired optimization: inspiration versus algorithmic behavior. Critical Analysis and Recommendations. cs.AI, pp. 1–76. arXiv:​2002.​08136v2.​
Metadaten
Titel
Improving the Protection of Wireless Sensor Network Using a Black Hole Optimization Algorithm (BHOA) on Best Feasible Node Capture Attack
verfasst von
Ankur Khare
Rajendra Gupta
Piyush Kumar Shukla
Copyright-Jahr
2022
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-2919-8_30

Neuer Inhalt