Instigating Fruit Fly Optimization for Node Capture Attack in calculating Energy Cost for Single Path Routing in Wireless Sensor Network

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Wireless sensor network (WSN) [1]is susceptible to different types of physical attacks. It is collection of tiny sized sensor nodes. The reason behind that is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN [2]. In this type, the node is substantially captured by an assailant and eradicates the secret information from the node`s storage. This paper proposes Fruit Fly Optimization Algorithm (FFOA)[13]. It is based on multiple objectives [4] node capture attack algorithm. Proposed algorithm serves these objectives: maximum node contribution [4], maximum key contribution [4], and least resource expenses [4]. The simulation result illustrates that FFOA obtains a maximum fraction of compromised traffic, lower attacking rounds, and lower energy cost as compared with matrix algorithm (MA) [5] and other node capture attack algorithms.

     

     


  • Keywords


    Vertex; Seizure; Fruit Fly; Optimization; Capturing; Vulnerable.

  • References


      [1] Amandeep Kaur and Sandeep Singh Kang, “Attacks in Wireless Sensor Network- A Review”, International Journal of Computer Sciences and Engineering, IJCSE, Vol. 6, Issue 4, pp-157-162, 2016.

      [2] BhavanaButani, Piyush Kumar Shukla, and Sanjay Silakari, “An Exhaustive Survey on Physical Node Capture Attack in WSN”,International Journal of Computer Applications, IJCA, Volume 95, No.3, pp-32-39, 2014. https://doi.org/10.5120/16577-6265.

      [3] Bhoopathy V. and R.M.S. Parvathi, “Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks”, International Journal of Engineering Research and Applications, IJERA, Vol. 2, Issue 2, pp-466-474, 2012.

      [4] Chi Lin andGuoweiWu, “Enhancing the attacking efficiency of the node captureattack in WSN: a matrix approach”, J Supercomput, Springer Science &Business Media, pp-1-19, 2013.

      [5] Chi Lin, Guowei Wu, Chang Wu Yu, and Lin Yao, “Maximizing destructiveness of node capture attack in wireless sensor networks”, J Supercomput, Springer Science & Business Media, Vol. 71, pp-3181–3212, 2015. https://doi.org/10.1007/s11227-015-1435-7.

      [6] Chi Lin, Tie Qiu, Mohammad S. Obaidat, Chang Wu Yu, Lin Yao and Guowei Wu, “MREA: a minimum resource expenditure node capture attack in wireless sensor networks”, Security and Communication Networks, Wiley Online Library, Vol. 9, pp-5502–5517, 2016. https://doi.org/10.1002/sec.1713.

      [7] Chuiwei Lu, and Defa Hu, “A Fault-Tolerant Routing Algorithm for Wireless SensorNetworks Based on the Structured Directional de Bruijn Graph”, Cybernetics and Information Technologies, Bulgarian Academy Of Sciences, Volume 16, No 2, pp-46-59, 2016. https://doi.org/10.1515/cait-2016-0019.

      [8] Daehee Kim, Dongwan Kim, and Sunshin An, “Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networks”, Sensors, MDPI, Vol. 16, pp-1 -22, 2016. https://doi.org/10.3390/s16071063.

      [9] Daehee Kim, Dongwan Kim and SunshinAn, “Communication Pattern Based Key Establishment Scheme in Heterogeneous Wireless Sensor Networks”, KSII Transactions on Internet and Information Systems, Vol. 10, No. 3, pp-1249-1272, 2016. https://doi.org/10.3837/tiis.2016.03.017.

      [10] Harpreet Kaur, “Node Replication attack detection using Dydog in Clustered sensor network”, Computer Science and Engineering Department, Thapar University Patiala, pp-1-71, 2017.

      [11] I. QasemzadehKolagar, H. Haj SeyyedJavadi, and M. Anzani, “Hypercube Bivariate-Based Key Management for Wireless Sensor Networks”, Journal of Sciences, Islamic Republic of Iran, University of Tehran, Vol. 28, No. 3, pp-273 – 285, 2017.

      [12] R. Vijayarajeswari, A. Rajivkannan and J. Santosh, “Survey Of Malicious Node Detection In Wireless Sensor Networks”, International Journal of Emerging Technology and Innovative Engineering, Volume 2, Issue 6, pp-335-338, 2016.

      [13] Ze Wang, Chang Zhou, and Yiran Liu, “Efficient Hybrid Detection of Node ReplicationAttacks in Mobile Sensor Networks”, Hindawi, Mobile Information Systems, pp-1-14, 2017. https://doi.org/10.1155/2017/8636379.

      [14] Xiao C., Hao K., Ding Y., “An Improved Fruit Fly Optimization Algorithm Inspired from Cell Communication Mechanism”, Hindawi Corporation, 2017.

      [15] Tague P., “Identifying, modeling, and mitigating attacks in wireless adhoc and sensor networks”.

      [16] W. Guowei, C. Xiaojie, S. Mohammad and L. Chi, “A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set”.


 

View

Download

Article ID: 15695
 
DOI: 10.14419/ijet.v8i3.15695




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.