Skip to main content

Application of Fruit Fly Optimization Algorithm for Single-Path Routing in Wireless Sensor Network for Node Capture Attack

  • Conference paper
  • First Online:
Computing and Network Sustainability

Abstract

Wireless sensor network (WSN) (Kaur and Kang in Int J Comput Sci Eng IJCSE 6(4):157–162, 2016, [1]) is susceptible to different types of physical attacks. It is collection of tiny-sized sensor nodes. The reason behind these attacks is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN (Butani et al. in Int J Comput Appl IJCA 95(3):32–39, 2014, [2]). In this type, the node is substantially captured by an assailant and eradicates the secret information from the node’s storage. This paper proposes a fruit fly optimization algorithm (FFOA) (Wang et al. in Mob Inf Syst 1–14, 2017, [3]). It is based on multiple objectives (Lin and Wu in J Supercomput 1–19, 2013, [4]) node capture attack algorithm. Proposed algorithm serves these objectives: maximum node contribution (Lin and Wu in J Supercomput 1–19, 2013, [4]), maximum key contribution (Lin and Wu in J Supercomput 1–19, 2013, [4]), and least resource expenses (Lin and Wu in J Supercomput 1–19, 2013, [4]). The simulation result illustrates that FFOA obtains a lower energy cost as compared with matrix algorithm (MA) (Lin et al. in J Supercomput 71:3181–3212, 2015, [5]) and other node capture attack algorithms when it is calculated for single-path routing algorithm. There are two variations in which this could have served. First is single path and the other is multi-path. But, in this paper, it is only the first case that has been discussed and calculated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kaur A, Kang SS (2016) Attacks in wireless sensor network—a review. Int J Comput Sci Eng IJCSE 6(4):157–162

    Google Scholar 

  2. Butani B, Shukla PK, Silakari S (2014) An exhaustive survey on physical node capture attack in WSN. Int J Comput Appl IJCA 95(3):32–39

    Article  Google Scholar 

  3. Wang Z, Zhou C, Liu Y (2017) Efficient hybrid detection of node replication attacks in mobile sensor networks. Mob Inf Syst 1–14. https://doi.org/10.1155/2017/8636379

    Google Scholar 

  4. Lin C, Wu G (2013) Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach. J Supercomput 1–19. https://doi.org/10.1007/s11227-013-0965-0

    Article  Google Scholar 

  5. Lin C, Wu G, Yu CW, Yao L (2015) Maximizing destructiveness of node capture attack in wireless sensor networks. J Supercomput 71:3181–3212. https://doi.org/10.1007/s11227-015-1435-7

    Article  Google Scholar 

  6. Guowei W, Xiaojie C, Mohammad S, Chi L, A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set

    Google Scholar 

  7. Lin C, Qiu T, Obaidat MS, Yu CW, Yao L, Wu G (2016) MREA: a minimum resource expenditure node capture attack in wireless sensor networks. Secur Commun Netw 9:5502–5517. https://doi.org/10.1002/sec.1713

    Article  Google Scholar 

  8. Xiao C, Hao K, Ding Y (2017) An improved fruit fly optimization algorithm inspired from cell communication mechanism. Hindawi Corporation

    Google Scholar 

  9. Bhoopathy V, Parvathi RMS (2012) Securing node capture attacks for hierarchical data aggregation in wireless sensor networks. Int J Eng Res Appl IJERA 2(2):466–474

    Google Scholar 

  10. Lu C, Hu D (2016) A Fault-Tolerant routing algorithm for wireless sensor networks based on the structured directional de Bruijn Graph. Cybern Inf Technol 16(2):46–59. https://doi.org/10.1515/cait-2016-0019

    Article  MathSciNet  Google Scholar 

  11. Kim D, Kim D, An S (2016) Source authentication for code dissemination supporting dynamic packet size in wireless sensor networks. Sensors 16:1–22. https://doi.org/10.3390/s16071063

    Article  Google Scholar 

  12. Kim D, Kim D, An S (2016) Communication pattern based key establishment scheme in heterogeneous wireless sensor networks. KSII Trans Internet Inf Syst 10(3):1249–1272. http://dx.doi.org/10.3837/tiis.2016.03.017

  13. Kaur H (2017) Node replication attack detection using Dydog in Clustered sensor network. Computer Science and Engineering Department, Thapar University Patiala, pp 1–71

    Google Scholar 

  14. Qasemzadeh Kolagar I, Haj Seyyed Javadi H, Anzani M (2017) Hypercube bivariate-based key management for wireless sensor networks. J Sci Islam Repub Iran 28(3):273–285

    Google Scholar 

  15. Vijayarajeswari R, Rajivkannan A, Santosh J (2016) Survey of malicious node detection in wireless sensor networks. Int J Emerg Technol Innov Eng 2(6):335–338

    Google Scholar 

  16. Tague P, Identifying, modeling, and mitigating attacks in wireless adhoc and sensor networks

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruby Bhatt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhatt, R., Maheshwary, P., Shukla, P. (2019). Application of Fruit Fly Optimization Algorithm for Single-Path Routing in Wireless Sensor Network for Node Capture Attack. In: Peng, SL., Dey, N., Bundele, M. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-13-7150-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7150-9_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7149-3

  • Online ISBN: 978-981-13-7150-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics