{"title":"无线传感器网络中高效干扰攻击检测的智能黏菌算法","authors":"Amirthasaravanan Arivunambi, Arjun Paramarthalingam","doi":"10.1016/j.gltp.2022.06.001","DOIUrl":null,"url":null,"abstract":"<div><p>Wireless Sensor Networks (WSNs) depicts to the group of spatially distributed sensor nodes, each node is having individual battery for power consumption which senses the factors like Temperature, Pressure, Soil makeup, Vehicular movement, and checks the physical presence of objects, which are communicate through internet and passing messages between nearest neighbor nodes. WSN are extensively used in several applications like Environmental Monitoring, Area Monitoring, Engineering Monitoring, Health Care Monitoring, and Military Applications. Since WSN are highly susceptible for many attacks especially Jamming Attack. This causes high energy consumption, reduces the life time of nodes, affects the entire sensor networks and most significantly also the confidentiality and integrity of the data packets which are transmitted through dissimilar nodes in the network. In order to overcome these issues, a new bio-inspired algorithm called Intelligent Slime Mold (ISM) has been introduced for detection jamming node and to setting up of alternate optimal path form source node to destination node in WSN to avoid jammer affected nodes by applying Context Aware Decision Rule (CADR). This work ensures the confidentiality and integrity of both the network and data packets.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 386-391"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000759/pdfft?md5=ad951a2e0159b09bf13123c4b064810a&pid=1-s2.0-S2666285X22000759-main.pdf","citationCount":"3","resultStr":"{\"title\":\"Intelligent slime mold algorithm for proficient jamming attack detection in wireless sensor network\",\"authors\":\"Amirthasaravanan Arivunambi, Arjun Paramarthalingam\",\"doi\":\"10.1016/j.gltp.2022.06.001\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Wireless Sensor Networks (WSNs) depicts to the group of spatially distributed sensor nodes, each node is having individual battery for power consumption which senses the factors like Temperature, Pressure, Soil makeup, Vehicular movement, and checks the physical presence of objects, which are communicate through internet and passing messages between nearest neighbor nodes. WSN are extensively used in several applications like Environmental Monitoring, Area Monitoring, Engineering Monitoring, Health Care Monitoring, and Military Applications. Since WSN are highly susceptible for many attacks especially Jamming Attack. This causes high energy consumption, reduces the life time of nodes, affects the entire sensor networks and most significantly also the confidentiality and integrity of the data packets which are transmitted through dissimilar nodes in the network. In order to overcome these issues, a new bio-inspired algorithm called Intelligent Slime Mold (ISM) has been introduced for detection jamming node and to setting up of alternate optimal path form source node to destination node in WSN to avoid jammer affected nodes by applying Context Aware Decision Rule (CADR). This work ensures the confidentiality and integrity of both the network and data packets.</p></div>\",\"PeriodicalId\":100588,\"journal\":{\"name\":\"Global Transitions Proceedings\",\"volume\":\"3 2\",\"pages\":\"Pages 386-391\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2666285X22000759/pdfft?md5=ad951a2e0159b09bf13123c4b064810a&pid=1-s2.0-S2666285X22000759-main.pdf\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Global Transitions Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2666285X22000759\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Global Transitions Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2666285X22000759","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intelligent slime mold algorithm for proficient jamming attack detection in wireless sensor network
Wireless Sensor Networks (WSNs) depicts to the group of spatially distributed sensor nodes, each node is having individual battery for power consumption which senses the factors like Temperature, Pressure, Soil makeup, Vehicular movement, and checks the physical presence of objects, which are communicate through internet and passing messages between nearest neighbor nodes. WSN are extensively used in several applications like Environmental Monitoring, Area Monitoring, Engineering Monitoring, Health Care Monitoring, and Military Applications. Since WSN are highly susceptible for many attacks especially Jamming Attack. This causes high energy consumption, reduces the life time of nodes, affects the entire sensor networks and most significantly also the confidentiality and integrity of the data packets which are transmitted through dissimilar nodes in the network. In order to overcome these issues, a new bio-inspired algorithm called Intelligent Slime Mold (ISM) has been introduced for detection jamming node and to setting up of alternate optimal path form source node to destination node in WSN to avoid jammer affected nodes by applying Context Aware Decision Rule (CADR). This work ensures the confidentiality and integrity of both the network and data packets.