International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 9 - Issue 3, March 2020 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

A Grey Wolf Optimization Algorithm (GWOA) For Node Capture Attack To Enhance The Security Of Wireless Sensor Network

[Full Text]



Ankur Khare, Rajendra Gupta, Piyush Kumar Shukla



Compromised Traffic, Contribution, Energy Utilization, Grey Wolf Optimization, Stability.



Wireless sensor network (WSN) is extremely liable to numerous substantial attacks due to constrained resource exploitation in the huge communication area. The attacker captures a specific number of nodes to cooperate with whole network and filch out the private information and encryption keys, known as node capture attack. We developed a Grey Wolf Optimization Algorithm (GWOA) to discover the nodes having maximum possibility of attacking. GWOA initiates on multi objectives like node`s stability and node`s contribution and simulation outputs illustrates that the GWOA obtains higher ratio of compromised traffic, minimum attacking rounds and minimum energy utilization cost as compared to the ACO and other node capture techniques.



[1] C. Lin and G. Wu, “Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach”, J Supercomput, Springer Science &Business Media, pp-1-19, 2013. (DOI 10.1007/s11227-013-0965-0)
[2] C. Lin, G. Wu, C. W. Yu, and L. Yao, “Maximizing destructiveness of node capture attack in wireless sensor networks”, J Supercomput, Springer Science & Business Media, Vol. 71, pp-3181–3212, 2015.(DOI 10.1007/s11227-015-1435-7)
[3] C. Lin, T. Qiu, M. S. Obaidat, C. W. Yu, L. Yao and G. Wu, “MREA: a minimum resource expenditure node capture attack in wireless sensor networks”, Security And Communication Networks, Wiley Online Library, Vol. 9, pp-5502–5517, 2016. (DOI: 10.1002/sec.1713)
[4] H. Kaur, “Node Replication attack detection using Dydog in Clustered sensor network”, Computer Science and Engineering Department, Thapar University Patiala, pp-1-71, 2017.
[5] Q. Kolagar, H. H. S. Javadi, and M. Anzani, “Hypercube Bivariate-Based Key Management for Wireless Sensor Networks”, Journal of Sciences, Islamic Republic of Iran, University of Tehran, Vol. 28, No. 3, pp-273 – 285, 2017.
[6] K. Chowdary, and K.V.V. Satyanarayana, “Malicious Node Detection and Reconstruction of Network In Sensor Actor Network”, Journal of Theoretical and Applied Information Technology, Vol.95, No.3, pp-582-591, 2017.
[7] M. Ehdaie, N. Alexiou, M. Ahmadian, M. R. Aref and P. Papadimitratos, “Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion”, Journal of Communication Engineering, Vol. 6, No. 2, pp-1-10, 2017.
[8] P. K. Shukla, S. Goyal, R. Wadhvani, M. A. Rizvi, P. Sharma, and N. Tantubay, “Finding Robust Assailant Using Optimization Functions (FiRAO-PG) in Wireless Sensor Network”, Hindawi Publishing Corporation, Mathematical Problems in Engineering, pp-1-8, 2015. (http://dx.doi.org/10.1155/2015/594345)
[9] P. Ahlawat and M. Dave, “An attack resistant key predistribution scheme for wireless sensor Networks”, Journal of King Saud University – Computer and Information Sciences, Elsevier, pp-1-13, 2018.
[10] P. Ahlawat and M. Dave, “An attack model based highly secure key management scheme for wireless sensor Networks”, 6th International Conference on Smart Computing and Communications, ICSCC, Elsevier, Kurukshetra, India, pp-1-7, 7-8 December 2017.