Implementation of fruit fly optimization algorithm (FFOA) to escalate the attacking efficiency of node capture attack in wireless sensor networks (WSN)
Wireless sensor network (WSN) is a group of a huge number of low price, low control, and
self-organizing specialized sensor nodes. WSN is very much vulnerable to different types of …
self-organizing specialized sensor nodes. WSN is very much vulnerable to different types of …
Improving the protection of wireless sensor network using a black hole optimization algorithm (BHOA) on best feasible node capture attack
Abstract Wireless Sensor Network (WSN) is an area of research that connects mutually huge
subareas of communication, routing, security, and attacks. WSN is conceivably the most …
subareas of communication, routing, security, and attacks. WSN is conceivably the most …
An attack model based highly secure key management scheme for wireless sensor networks
Wireless sensor network (WSN) security is a critical issue due to its inherent characteristic
and unattended operation which makes it vulnerable to many attacks. Key management …
and unattended operation which makes it vulnerable to many attacks. Key management …
Application of fruit fly optimization algorithm for single-path routing in wireless sensor network for node capture attack
Wireless sensor network (WSN)(Kaur and Kang in Int J Comput Sci Eng IJCSE 6 (4): 157–
162, 2016,[1]) is susceptible to different types of physical attacks. It is collection of tiny-sized …
162, 2016,[1]) is susceptible to different types of physical attacks. It is collection of tiny-sized …
A black widow optimization algorithm (BWOA) for node capture attack to enhance the wireless sensor network protection
The resource exploitation is inhibited in the huge region of WSN (Wireless Sensor Network)
and various attacks are introduced in vast vulnerable network. The intruder seizes the …
and various attacks are introduced in vast vulnerable network. The intruder seizes the …
A cost‐effective attack matrix based key management scheme with dominance key set for wireless sensor network security
To guarantee the proper functionality of wireless sensor network even in the presence of the
potential threats, a well‐designed key management scheme is very important. The …
potential threats, a well‐designed key management scheme is very important. The …
Asymmetric probabilistic minimum-cost Hamiltonian cycle problem considering arc and vertex failures
S Rasti, Y Xu - Computers & Operations Research, 2023 - Elsevier
In this paper, we introduce the asymmetric probabilistic minimum-cost Hamiltonian cycle
problem (APMCHCP) where arcs and vertices in the graph are possible to fail. APMCHCP is …
problem (APMCHCP) where arcs and vertices in the graph are possible to fail. APMCHCP is …
Secure path key establishment schemes based on random key management for WSN
A large number of the path key establishment schemes regard same probability of the node
capture attack for each node in the wireless sensor networks. However, in certain critical …
capture attack for each node in the wireless sensor networks. However, in certain critical …
[PDF][PDF] A dragonfly optimization algorithm (DOA) for node capture attack to improve the security of wireless sensor network
Wireless sensor network (WSN) is highly susceptible to several network attacks because of
restricted resource utilization in the large network area of communication. The node capture …
restricted resource utilization in the large network area of communication. The node capture …
Secure Path Key Establishment for WSN
Several path key setup strategies make the assumption that node capture attacks are
equally likely to affect every node in a wireless sensor network. However, in crucial …
equally likely to affect every node in a wireless sensor network. However, in crucial …