Amara S A L G Gopala Gupta, Syam Prasad Gudapati, Praveen Tumuluru
{"title":"利用高效的优化防御策略模型保护无线传感器网络免受节点捕获攻击","authors":"Amara S A L G Gopala Gupta, Syam Prasad Gudapati, Praveen Tumuluru","doi":"10.47974/jdmsc-1771","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Networks (WSNs) are a promising evolving technology for recent real-world applications in collaborative settings. These applications ranging from household monitoring to crucial military applications transmit critical data and thus more challenging approaches are required for providing security. In WSNs, a node capture attack (NCA) is a more serious attack among various attacks which supports an impostor to perform different network (NW) operations, and thereby the security of the entire NW is compromised easily. For conquering the surpassing issues of sensitivity-related techniques and for enhancing the NCA’s AE, we establish the NCA technique amalgamating several objectives like speed and location to lessen comprehensive intricacy. For securing the NW out of the NCA, this study proffers Improved Flower Pollination Optimization Defense Strategy Algorithm (IFPODSA) intending to compute the multiple objective functions for effectual chief administration procedure employing Hankel matrix formation. This proffered IFPODSA is correlated with two prevailing methodologies like Fruit Fly Optimization Algorithm (FFOA) and Finding Robust Assailant Optimization-Particle Swarm Optimization and Genetic Algorithm (FRAOPSOGA) concerning diverse criteria. Consequently, it has been observed that the proffered IFPODSA attains 458.7 kbps of throughput, 81.56% of PDR, 18.2% of energy consumption, and 64.36% of overhead.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing wireless sensor network from node capture attack using an efficient optimization defense strategy model\",\"authors\":\"Amara S A L G Gopala Gupta, Syam Prasad Gudapati, Praveen Tumuluru\",\"doi\":\"10.47974/jdmsc-1771\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless Sensor Networks (WSNs) are a promising evolving technology for recent real-world applications in collaborative settings. These applications ranging from household monitoring to crucial military applications transmit critical data and thus more challenging approaches are required for providing security. In WSNs, a node capture attack (NCA) is a more serious attack among various attacks which supports an impostor to perform different network (NW) operations, and thereby the security of the entire NW is compromised easily. For conquering the surpassing issues of sensitivity-related techniques and for enhancing the NCA’s AE, we establish the NCA technique amalgamating several objectives like speed and location to lessen comprehensive intricacy. For securing the NW out of the NCA, this study proffers Improved Flower Pollination Optimization Defense Strategy Algorithm (IFPODSA) intending to compute the multiple objective functions for effectual chief administration procedure employing Hankel matrix formation. This proffered IFPODSA is correlated with two prevailing methodologies like Fruit Fly Optimization Algorithm (FFOA) and Finding Robust Assailant Optimization-Particle Swarm Optimization and Genetic Algorithm (FRAOPSOGA) concerning diverse criteria. Consequently, it has been observed that the proffered IFPODSA attains 458.7 kbps of throughput, 81.56% of PDR, 18.2% of energy consumption, and 64.36% of overhead.\",\"PeriodicalId\":193977,\"journal\":{\"name\":\"Journal of Discrete Mathematical Sciences and Cryptography\",\"volume\":\"84 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Discrete Mathematical Sciences and Cryptography\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47974/jdmsc-1771\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Discrete Mathematical Sciences and Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47974/jdmsc-1771","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing wireless sensor network from node capture attack using an efficient optimization defense strategy model
Wireless Sensor Networks (WSNs) are a promising evolving technology for recent real-world applications in collaborative settings. These applications ranging from household monitoring to crucial military applications transmit critical data and thus more challenging approaches are required for providing security. In WSNs, a node capture attack (NCA) is a more serious attack among various attacks which supports an impostor to perform different network (NW) operations, and thereby the security of the entire NW is compromised easily. For conquering the surpassing issues of sensitivity-related techniques and for enhancing the NCA’s AE, we establish the NCA technique amalgamating several objectives like speed and location to lessen comprehensive intricacy. For securing the NW out of the NCA, this study proffers Improved Flower Pollination Optimization Defense Strategy Algorithm (IFPODSA) intending to compute the multiple objective functions for effectual chief administration procedure employing Hankel matrix formation. This proffered IFPODSA is correlated with two prevailing methodologies like Fruit Fly Optimization Algorithm (FFOA) and Finding Robust Assailant Optimization-Particle Swarm Optimization and Genetic Algorithm (FRAOPSOGA) concerning diverse criteria. Consequently, it has been observed that the proffered IFPODSA attains 458.7 kbps of throughput, 81.56% of PDR, 18.2% of energy consumption, and 64.36% of overhead.