果蝇优化算法在无线传感器网络节点捕获攻击中的应用

Ruby Bhatt, P. Maheshwary, P. Shukla
{"title":"果蝇优化算法在无线传感器网络节点捕获攻击中的应用","authors":"Ruby Bhatt, P. Maheshwary, P. Shukla","doi":"10.1109/ICACAT.2018.8933703","DOIUrl":null,"url":null,"abstract":"Sensors are most important concept now-a-days and Wireless sensor network (WSN) [1] is a crucial technology. But, these are susceptible to different types of physical attacks. It is assortment of miniature sized sensor nodes. The reason behind vulnerable attacks is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN [2]. In this type, the node is substantially captured by an assailant and eradicates the secret information from the node’s storage. This paper proposes a Fruit Fly Optimization Algorithm (FFOA) [13]. It is based on multiple objectives [4] node capture attack algorithm. Proposed algorithm serves these objectives: maximum node contribution [4], maximum key contribution [4], and least resource expenses [4]. The simulation result illustrates that FFOA obtains a maximum fraction of compromised traffic, lower attacking rounds, and lower energy cost as compared with matrix algorithm (MA) [5] and other node capture attack algorithms.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"15 1","pages":"1-4"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Application of Fruit Fly optimization Algorithm for Node Capture Attack in Wireless Sensor Network\",\"authors\":\"Ruby Bhatt, P. Maheshwary, P. Shukla\",\"doi\":\"10.1109/ICACAT.2018.8933703\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Sensors are most important concept now-a-days and Wireless sensor network (WSN) [1] is a crucial technology. But, these are susceptible to different types of physical attacks. It is assortment of miniature sized sensor nodes. The reason behind vulnerable attacks is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN [2]. In this type, the node is substantially captured by an assailant and eradicates the secret information from the node’s storage. This paper proposes a Fruit Fly Optimization Algorithm (FFOA) [13]. It is based on multiple objectives [4] node capture attack algorithm. Proposed algorithm serves these objectives: maximum node contribution [4], maximum key contribution [4], and least resource expenses [4]. The simulation result illustrates that FFOA obtains a maximum fraction of compromised traffic, lower attacking rounds, and lower energy cost as compared with matrix algorithm (MA) [5] and other node capture attack algorithms.\",\"PeriodicalId\":6575,\"journal\":{\"name\":\"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)\",\"volume\":\"15 1\",\"pages\":\"1-4\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACAT.2018.8933703\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACAT.2018.8933703","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

传感器是当今社会最重要的概念,无线传感器网络(WSN)是其中的关键技术。但是,它们容易受到不同类型的物理攻击。它是微型传感器节点的分类。易受攻击的原因是其有限的资源容量。它被筛选到外部大气循环数据。节点捕获攻击是无线传感器网络中最严重的攻击之一。在这种类型中,攻击者基本上捕获了节点,并从节点的存储中删除了秘密信息。本文提出了一种果蝇优化算法(FFOA)[13]。它是基于[4]节点的多目标捕获攻击算法。该算法的目标是:最大节点贡献[4],最大密钥贡献[4],最小资源消耗[4]。仿真结果表明,与矩阵算法(matrix algorithm, MA)、[5]和其他节点捕获攻击算法相比,FFOA获得了最大的入侵流量比例、更少的攻击回合数和更低的能量消耗。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Application of Fruit Fly optimization Algorithm for Node Capture Attack in Wireless Sensor Network
Sensors are most important concept now-a-days and Wireless sensor network (WSN) [1] is a crucial technology. But, these are susceptible to different types of physical attacks. It is assortment of miniature sized sensor nodes. The reason behind vulnerable attacks is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN [2]. In this type, the node is substantially captured by an assailant and eradicates the secret information from the node’s storage. This paper proposes a Fruit Fly Optimization Algorithm (FFOA) [13]. It is based on multiple objectives [4] node capture attack algorithm. Proposed algorithm serves these objectives: maximum node contribution [4], maximum key contribution [4], and least resource expenses [4]. The simulation result illustrates that FFOA obtains a maximum fraction of compromised traffic, lower attacking rounds, and lower energy cost as compared with matrix algorithm (MA) [5] and other node capture attack algorithms.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Metaphoric Investigation on Prediction of Heart Disease using Machine Learning Dynamic Weight Ranking algorithm using R-F score for Efficient Caching VLSI Architecture for Low Cost and Power Reversible Arithmetic Logic Unit based on Reversible Gate Advance Malware Analysis Using Static and Dynamic Methodology Evaluate Performance of student by using Normalized data set, Fuzzy and A-priori Like Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1