Skip to main content

Improving the Protection of Wireless Sensor Network Using a Black Hole Optimization Algorithm (BHOA) on Best Feasible Node Capture Attack

  • Conference paper
  • First Online:
IoT and Analytics for Sensor Networks

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 244))

Abstract

Wireless Sensor Network (WSN) is an area of research that connects mutually huge subareas of communication, routing, security, and attacks. WSN is conceivably the most susceptible network to node capture attack due to its dynamic nature in huge area. A node capture attack is introduced by seizing few nodes through an intruder to capture entire WSN by extracting the useful information like keys, routing mechanism, and data from WSN. To improve the protection of WSN, we proposed a Black Hole Optimization Algorithm (BHOA) on best feasible node capture attack to discover the optimal nodes having superior possibility of attack. The BHOA is applied on a function Vertex Participation. The experiment is performed on MATLAB 2019a environment, and the results show the better quality, efficiency of BHOA against MA, OGA, MREA, GA, and FFOA based on traffic compromised ratio, power consumption cost, and attacking time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xiong, C., Li, S., Liu, L., Li, R., & Jin, Y., (2019). A hybrid key pre-distribution scheme for wireless sensor networks. In IOP Conf. Series, Journal of Physics (pp. 1–18). https://doi.org/10.1088/1742-6596/1229/1/012066.

  2. Shaukat, H. R., Hashim, F., Shaukat, M. A., & Alezabi, K. A. (2020). Hybrid multi-level detection and mitigation of clone attacks in mobile wireless sensor network (MWSN). Sensors, MDPI, 20, 1–23.

    Article  Google Scholar 

  3. Chowdary, K., & Satyanarayana, K. V. V. (2017). Malicious node detection and reconstruction of network in sensor actor network. Journal of Theoretical and Applied Information Technology, 95(3), 582–591.

    Google Scholar 

  4. Ehdaie, M., Alexiou, N., Ahmadian, M., Aref, M. R., & Papadimitratos, P. (2017). Mitigating node capture attack in random key distribution schemes through key deletion. Journal of Communication Engineering, 6(2), 1–10.

    Google Scholar 

  5. Alshammari, M. R., & Elleithy, K. M. (2018). Efficient and secure key distribution protocol for wireless sensor networks. Sensors, MDPI, 18, 1–25. https://doi.org/10.3390/s18103569.

    Article  Google Scholar 

  6. Ahlawat, P., & Dave, M. (2018). An attack resistant key predistribution scheme for wireless sensor Networks. Journal of King Saud University—Computer and Information Sciences, Elsevier, 1–13.

    Google Scholar 

  7. Lin, C., & Wu, G. (2013). Enhancing the attacking efficiency of the node capture attack in WSN: A matrix approach. The Journal of Supercomputing, Springer Science & Business Media, 1–19. https://doi.org/10.1007/s11227-013-0965-0.

  8. Lin, C., Wu, G., Yu, C. W., & Yao, L. (2015). Maximizing destructiveness of node capture attack in wireless sensor networks. The Journal of Supercomputing, Springer Science & Business Media, 71, 3181–3212. https://doi.org/10.1007/s11227-015-1435-7.

    Article  Google Scholar 

  9. Lin, C., Qiu, T., Obaidat, M. S., Yu, C. W., Yao, L., & Wu, G. (2016). MREA: A minimum resource expenditure node capture attack in wireless sensor networks. Security and Communication Networks, Wiley Online Library, 9, 5502–5517. https://doi.org/10.1002/sec.1713.

    Article  Google Scholar 

  10. Bhatt, R., Maheshwary, P., Shukla, P., Shukla, P., Shrivastava, M., & Changlani, S. (2020). Implementation of fruit fly optimization algorithm (FFOA) to escalate the attacking efficiency of node capture attack in wireless sensor networks (WSN). Computer Communications, Elsevier, 149, 134–145.

    Article  Google Scholar 

  11. Shukla, P. K., Goyal, S., Wadhvani, R., Rizvi, M. A., Sharma, P., & Tantubay, N. (2015). Finding robust assailant using optimization functions (FiRAO-PG) in wireless sensor network. Hindawi Publishing Corporation, Mathematical Problems in Engineering, 1–8. https://doi.org/10.1155/2015/594345.

  12. Molina, D., Poyatos, J., Ser, J. D., Garcia, S., Hussain A., & Herrera, F. (2020). Comprehensive taxonomies of nature- and bio-inspired optimization: inspiration versus algorithmic behavior. Critical Analysis and Recommendations. cs.AI, pp. 1–76. arXiv:2002.08136v2.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khare, A., Gupta, R., Shukla, P.K. (2022). Improving the Protection of Wireless Sensor Network Using a Black Hole Optimization Algorithm (BHOA) on Best Feasible Node Capture Attack. In: Nayak, P., Pal, S., Peng, SL. (eds) IoT and Analytics for Sensor Networks. Lecture Notes in Networks and Systems, vol 244. Springer, Singapore. https://doi.org/10.1007/978-981-16-2919-8_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-2919-8_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-2918-1

  • Online ISBN: 978-981-16-2919-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics