Implementation of fruit fly optimization algorithm (FFOA) to escalate the attacking efficiency of node capture attack in wireless sensor networks (WSN)

R Bhatt, P Maheshwary, P Shukla, P Shukla… - Computer …, 2020 - Elsevier
Wireless sensor network (WSN) is a group of a huge number of low price, low control, and
self-organizing specialized sensor nodes. WSN is very much vulnerable to different types of …

Improving the protection of wireless sensor network using a black hole optimization algorithm (BHOA) on best feasible node capture attack

A Khare, R Gupta, PK Shukla - IoT and Analytics for Sensor Networks …, 2022 - Springer
Abstract Wireless Sensor Network (WSN) is an area of research that connects mutually huge
subareas of communication, routing, security, and attacks. WSN is conceivably the most …

An attack model based highly secure key management scheme for wireless sensor networks

P Ahlawat, M Dave - Procedia Computer Science, 2018 - Elsevier
Wireless sensor network (WSN) security is a critical issue due to its inherent characteristic
and unattended operation which makes it vulnerable to many attacks. Key management …

Application of fruit fly optimization algorithm for single-path routing in wireless sensor network for node capture attack

R Bhatt, P Maheshwary, P Shukla - Computing and Network Sustainability …, 2019 - Springer
Wireless sensor network (WSN)(Kaur and Kang in Int J Comput Sci Eng IJCSE 6 (4): 157–
162, 2016,[1]) is susceptible to different types of physical attacks. It is collection of tiny-sized …

A black widow optimization algorithm (BWOA) for node capture attack to enhance the wireless sensor network protection

A Khare, R Gupta, PK Shukla, R Chowdhury… - … , Data Science and …, 2021 - Springer
The resource exploitation is inhibited in the huge region of WSN (Wireless Sensor Network)
and various attacks are introduced in vast vulnerable network. The intruder seizes the …

A cost‐effective attack matrix based key management scheme with dominance key set for wireless sensor network security

P Ahlawat, M Dave - International Journal of Communication …, 2018 - Wiley Online Library
To guarantee the proper functionality of wireless sensor network even in the presence of the
potential threats, a well‐designed key management scheme is very important. The …

Asymmetric probabilistic minimum-cost Hamiltonian cycle problem considering arc and vertex failures

S Rasti, Y Xu - Computers & Operations Research, 2023 - Elsevier
In this paper, we introduce the asymmetric probabilistic minimum-cost Hamiltonian cycle
problem (APMCHCP) where arcs and vertices in the graph are possible to fail. APMCHCP is …

Secure path key establishment schemes based on random key management for WSN

P Ahlawat, M Dave - Proceedings of the National Academy of Sciences …, 2021 - Springer
A large number of the path key establishment schemes regard same probability of the node
capture attack for each node in the wireless sensor networks. However, in certain critical …

[PDF][PDF] A dragonfly optimization algorithm (DOA) for node capture attack to improve the security of wireless sensor network

A Khare, R Gupta, PK Shukla - Int J Emerg Technol Adv Eng, 2019 - researchgate.net
Wireless sensor network (WSN) is highly susceptible to several network attacks because of
restricted resource utilization in the large network area of communication. The node capture …

Secure Path Key Establishment for WSN

K Kumar, P Ahlawat - 2023 7th International Conference On …, 2023 - ieeexplore.ieee.org
Several path key setup strategies make the assumption that node capture attacks are
equally likely to affect every node in a wireless sensor network. However, in crucial …