Abstract
Wireless Sensor Network (WSN) is an area of research that connects mutually huge subareas of communication, routing, security, and attacks. WSN is conceivably the most susceptible network to node capture attack due to its dynamic nature in huge area. A node capture attack is introduced by seizing few nodes through an intruder to capture entire WSN by extracting the useful information like keys, routing mechanism, and data from WSN. To improve the protection of WSN, we proposed a Black Hole Optimization Algorithm (BHOA) on best feasible node capture attack to discover the optimal nodes having superior possibility of attack. The BHOA is applied on a function Vertex Participation. The experiment is performed on MATLAB 2019a environment, and the results show the better quality, efficiency of BHOA against MA, OGA, MREA, GA, and FFOA based on traffic compromised ratio, power consumption cost, and attacking time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xiong, C., Li, S., Liu, L., Li, R., & Jin, Y., (2019). A hybrid key pre-distribution scheme for wireless sensor networks. In IOP Conf. Series, Journal of Physics (pp. 1–18). https://doi.org/10.1088/1742-6596/1229/1/012066.
Shaukat, H. R., Hashim, F., Shaukat, M. A., & Alezabi, K. A. (2020). Hybrid multi-level detection and mitigation of clone attacks in mobile wireless sensor network (MWSN). Sensors, MDPI, 20, 1–23.
Chowdary, K., & Satyanarayana, K. V. V. (2017). Malicious node detection and reconstruction of network in sensor actor network. Journal of Theoretical and Applied Information Technology, 95(3), 582–591.
Ehdaie, M., Alexiou, N., Ahmadian, M., Aref, M. R., & Papadimitratos, P. (2017). Mitigating node capture attack in random key distribution schemes through key deletion. Journal of Communication Engineering, 6(2), 1–10.
Alshammari, M. R., & Elleithy, K. M. (2018). Efficient and secure key distribution protocol for wireless sensor networks. Sensors, MDPI, 18, 1–25. https://doi.org/10.3390/s18103569.
Ahlawat, P., & Dave, M. (2018). An attack resistant key predistribution scheme for wireless sensor Networks. Journal of King Saud University—Computer and Information Sciences, Elsevier, 1–13.
Lin, C., & Wu, G. (2013). Enhancing the attacking efficiency of the node capture attack in WSN: A matrix approach. The Journal of Supercomputing, Springer Science & Business Media, 1–19. https://doi.org/10.1007/s11227-013-0965-0.
Lin, C., Wu, G., Yu, C. W., & Yao, L. (2015). Maximizing destructiveness of node capture attack in wireless sensor networks. The Journal of Supercomputing, Springer Science & Business Media, 71, 3181–3212. https://doi.org/10.1007/s11227-015-1435-7.
Lin, C., Qiu, T., Obaidat, M. S., Yu, C. W., Yao, L., & Wu, G. (2016). MREA: A minimum resource expenditure node capture attack in wireless sensor networks. Security and Communication Networks, Wiley Online Library, 9, 5502–5517. https://doi.org/10.1002/sec.1713.
Bhatt, R., Maheshwary, P., Shukla, P., Shukla, P., Shrivastava, M., & Changlani, S. (2020). Implementation of fruit fly optimization algorithm (FFOA) to escalate the attacking efficiency of node capture attack in wireless sensor networks (WSN). Computer Communications, Elsevier, 149, 134–145.
Shukla, P. K., Goyal, S., Wadhvani, R., Rizvi, M. A., Sharma, P., & Tantubay, N. (2015). Finding robust assailant using optimization functions (FiRAO-PG) in wireless sensor network. Hindawi Publishing Corporation, Mathematical Problems in Engineering, 1–8. https://doi.org/10.1155/2015/594345.
Molina, D., Poyatos, J., Ser, J. D., Garcia, S., Hussain A., & Herrera, F. (2020). Comprehensive taxonomies of nature- and bio-inspired optimization: inspiration versus algorithmic behavior. Critical Analysis and Recommendations. cs.AI, pp. 1–76. arXiv:2002.08136v2.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khare, A., Gupta, R., Shukla, P.K. (2022). Improving the Protection of Wireless Sensor Network Using a Black Hole Optimization Algorithm (BHOA) on Best Feasible Node Capture Attack. In: Nayak, P., Pal, S., Peng, SL. (eds) IoT and Analytics for Sensor Networks. Lecture Notes in Networks and Systems, vol 244. Springer, Singapore. https://doi.org/10.1007/978-981-16-2919-8_30
Download citation
DOI: https://doi.org/10.1007/978-981-16-2919-8_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-2918-1
Online ISBN: 978-981-16-2919-8
eBook Packages: EngineeringEngineering (R0)