{"title":"利用加权 RNN 和最优路径选择在 WSN 中通过安全路由检测和缓解吸血鬼攻击","authors":"","doi":"10.1016/j.cose.2024.103991","DOIUrl":null,"url":null,"abstract":"<div><p>In Wireless Sensor Networks (WSNs), one of the most significant threats is vampire attacks in sensor nodes. These attacks are marked by malicious behaviors within sensor nodes, often exploiting vulnerabilities inherent in routing protocols. These attacks can disrupt the connectivity of the network and significantly impact the energy resources. However, these intermediate nodes can introduce security vulnerabilities, making network security in WSN is challenging task. To address this issue, a novel deep learning-based vampire attack detection model is proposed. The developed deep learning-based vampire attack detection model is performed by following steps like data collection, attack detection, mitigation, and optimal path selection. Initially, the data attributes for all sensor nodes in the WSN system are collected. Further, the vampire attack detection is carried out by a Weighted Recurrent Neural Network (WRNN), here the weight values are optimized using Enhanced Golf Optimization Algorithm (EGOA). The detected vampire nodes are effectively separated based on different characteristics of nodes like node broadcast count, node energy, and node Packet Received Ratio (PRR). The attack mitigation process is executed by the separation of the vampire nodes from the network, the remaining nodes are considered for the routing process. The optimal paths are chosen by the proposed EGOA. Finally, the result of the suggested vampire attack detection model is compared with the conventional techniques in terms of various evaluation indices.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8000,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection\",\"authors\":\"\",\"doi\":\"10.1016/j.cose.2024.103991\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>In Wireless Sensor Networks (WSNs), one of the most significant threats is vampire attacks in sensor nodes. These attacks are marked by malicious behaviors within sensor nodes, often exploiting vulnerabilities inherent in routing protocols. These attacks can disrupt the connectivity of the network and significantly impact the energy resources. However, these intermediate nodes can introduce security vulnerabilities, making network security in WSN is challenging task. To address this issue, a novel deep learning-based vampire attack detection model is proposed. The developed deep learning-based vampire attack detection model is performed by following steps like data collection, attack detection, mitigation, and optimal path selection. Initially, the data attributes for all sensor nodes in the WSN system are collected. Further, the vampire attack detection is carried out by a Weighted Recurrent Neural Network (WRNN), here the weight values are optimized using Enhanced Golf Optimization Algorithm (EGOA). The detected vampire nodes are effectively separated based on different characteristics of nodes like node broadcast count, node energy, and node Packet Received Ratio (PRR). The attack mitigation process is executed by the separation of the vampire nodes from the network, the remaining nodes are considered for the routing process. The optimal paths are chosen by the proposed EGOA. Finally, the result of the suggested vampire attack detection model is compared with the conventional techniques in terms of various evaluation indices.</p></div>\",\"PeriodicalId\":51004,\"journal\":{\"name\":\"Computers & Security\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.8000,\"publicationDate\":\"2024-07-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0167404824002967\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404824002967","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection
In Wireless Sensor Networks (WSNs), one of the most significant threats is vampire attacks in sensor nodes. These attacks are marked by malicious behaviors within sensor nodes, often exploiting vulnerabilities inherent in routing protocols. These attacks can disrupt the connectivity of the network and significantly impact the energy resources. However, these intermediate nodes can introduce security vulnerabilities, making network security in WSN is challenging task. To address this issue, a novel deep learning-based vampire attack detection model is proposed. The developed deep learning-based vampire attack detection model is performed by following steps like data collection, attack detection, mitigation, and optimal path selection. Initially, the data attributes for all sensor nodes in the WSN system are collected. Further, the vampire attack detection is carried out by a Weighted Recurrent Neural Network (WRNN), here the weight values are optimized using Enhanced Golf Optimization Algorithm (EGOA). The detected vampire nodes are effectively separated based on different characteristics of nodes like node broadcast count, node energy, and node Packet Received Ratio (PRR). The attack mitigation process is executed by the separation of the vampire nodes from the network, the remaining nodes are considered for the routing process. The optimal paths are chosen by the proposed EGOA. Finally, the result of the suggested vampire attack detection model is compared with the conventional techniques in terms of various evaluation indices.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.