Abstract
Wireless sensor network (WSN) (Kaur and Kang in Int J Comput Sci Eng IJCSE 6(4):157–162, 2016, [1]) is susceptible to different types of physical attacks. It is collection of tiny-sized sensor nodes. The reason behind these attacks is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN (Butani et al. in Int J Comput Appl IJCA 95(3):32–39, 2014, [2]). In this type, the node is substantially captured by an assailant and eradicates the secret information from the node’s storage. This paper proposes a fruit fly optimization algorithm (FFOA) (Wang et al. in Mob Inf Syst 1–14, 2017, [3]). It is based on multiple objectives (Lin and Wu in J Supercomput 1–19, 2013, [4]) node capture attack algorithm. Proposed algorithm serves these objectives: maximum node contribution (Lin and Wu in J Supercomput 1–19, 2013, [4]), maximum key contribution (Lin and Wu in J Supercomput 1–19, 2013, [4]), and least resource expenses (Lin and Wu in J Supercomput 1–19, 2013, [4]). The simulation result illustrates that FFOA obtains a lower energy cost as compared with matrix algorithm (MA) (Lin et al. in J Supercomput 71:3181–3212, 2015, [5]) and other node capture attack algorithms when it is calculated for single-path routing algorithm. There are two variations in which this could have served. First is single path and the other is multi-path. But, in this paper, it is only the first case that has been discussed and calculated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kaur A, Kang SS (2016) Attacks in wireless sensor network—a review. Int J Comput Sci Eng IJCSE 6(4):157–162
Butani B, Shukla PK, Silakari S (2014) An exhaustive survey on physical node capture attack in WSN. Int J Comput Appl IJCA 95(3):32–39
Wang Z, Zhou C, Liu Y (2017) Efficient hybrid detection of node replication attacks in mobile sensor networks. Mob Inf Syst 1–14. https://doi.org/10.1155/2017/8636379
Lin C, Wu G (2013) Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach. J Supercomput 1–19. https://doi.org/10.1007/s11227-013-0965-0
Lin C, Wu G, Yu CW, Yao L (2015) Maximizing destructiveness of node capture attack in wireless sensor networks. J Supercomput 71:3181–3212. https://doi.org/10.1007/s11227-015-1435-7
Guowei W, Xiaojie C, Mohammad S, Chi L, A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set
Lin C, Qiu T, Obaidat MS, Yu CW, Yao L, Wu G (2016) MREA: a minimum resource expenditure node capture attack in wireless sensor networks. Secur Commun Netw 9:5502–5517. https://doi.org/10.1002/sec.1713
Xiao C, Hao K, Ding Y (2017) An improved fruit fly optimization algorithm inspired from cell communication mechanism. Hindawi Corporation
Bhoopathy V, Parvathi RMS (2012) Securing node capture attacks for hierarchical data aggregation in wireless sensor networks. Int J Eng Res Appl IJERA 2(2):466–474
Lu C, Hu D (2016) A Fault-Tolerant routing algorithm for wireless sensor networks based on the structured directional de Bruijn Graph. Cybern Inf Technol 16(2):46–59. https://doi.org/10.1515/cait-2016-0019
Kim D, Kim D, An S (2016) Source authentication for code dissemination supporting dynamic packet size in wireless sensor networks. Sensors 16:1–22. https://doi.org/10.3390/s16071063
Kim D, Kim D, An S (2016) Communication pattern based key establishment scheme in heterogeneous wireless sensor networks. KSII Trans Internet Inf Syst 10(3):1249–1272. http://dx.doi.org/10.3837/tiis.2016.03.017
Kaur H (2017) Node replication attack detection using Dydog in Clustered sensor network. Computer Science and Engineering Department, Thapar University Patiala, pp 1–71
Qasemzadeh Kolagar I, Haj Seyyed Javadi H, Anzani M (2017) Hypercube bivariate-based key management for wireless sensor networks. J Sci Islam Repub Iran 28(3):273–285
Vijayarajeswari R, Rajivkannan A, Santosh J (2016) Survey of malicious node detection in wireless sensor networks. Int J Emerg Technol Innov Eng 2(6):335–338
Tague P, Identifying, modeling, and mitigating attacks in wireless adhoc and sensor networks
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bhatt, R., Maheshwary, P., Shukla, P. (2019). Application of Fruit Fly Optimization Algorithm for Single-Path Routing in Wireless Sensor Network for Node Capture Attack. In: Peng, SL., Dey, N., Bundele, M. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-13-7150-9_13
Download citation
DOI: https://doi.org/10.1007/978-981-13-7150-9_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7149-3
Online ISBN: 978-981-13-7150-9
eBook Packages: EngineeringEngineering (R0)