Access the full text.
Sign up today, get DeepDyve free for 14 days.
Hanane Kalkha, H. Satori, K. Satori (2019)
Preventing Black Hole Attack in Wireless Sensor Network Using HMMProcedia Computer Science
M. Bonyadi, Z. Michalewicz (2016)
Analysis of Stability, Local Convergence, and Transformation Sensitivity of a Variant of the Particle Swarm Optimization AlgorithmIEEE Transactions on Evolutionary Computation, 20
Gulshan Kumar, M. Rai, R. Saha (2017)
Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor NetworksJ. Netw. Comput. Appl., 99
Parmar Amish, V. Vaghela (2016)
Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV ProtocolProcedia Computer Science, 79
Mobile Information Systems, 2016
S. Narayanan, G. Murugaboopathi (2018)
Modified secure AODV protocol to prevent wormhole attack in MANETConcurrency and Computation: Practice and Experience, 32
IEEE Systems Journal, 9
Ninu Sreedharan, Brammya Ganesan, R. Raveendran, Praveena Sarala, Binu Dennis, Rajakumar R. (2018)
Grey Wolf optimisation-based feature selection and classification for facial emotion recognitionIET Biom., 7
D. Buch, D. Jinwala (2011)
Prevention of Wormhole Attack in Wireless Sensor NetworkArXiv, abs/1110.1928
Xin-She Yang (2012)
Multiobjective firefly algorithm for continuous optimizationEngineering with Computers, 29
Guowei Wu, Xiaojie Chen, Lin Yao, Youngjun Lee, Kangbin Yim (2014)
An efficient wormhole attack detection method in wireless sensor networksComput. Sci. Inf. Syst., 11
Meenakshi Tripathi, M. Gaur, V. Laxmi (2013)
Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN
Yih-Chun Hu, A. Perrig, David Johnson (2006)
Wormhole attacks in wireless networksIEEE Journal on Selected Areas in Communications, 24
Jayashree Padmanabhan, Venkatesh Manickavasagam (2018)
Scalable and Distributed Detection Analysis on Wormhole Links in Wireless Sensor Networks for Networked SystemsIEEE Access, 6
Shiyu Ji, Tingting Chen, S. Zhong (2015)
Wormhole Attack Detection Algorithms in Wireless Network Coding SystemsIEEE Transactions on Mobile Computing, 14
Ankit Kumar, Vijayakumar Varadarajan, Abhishek Kumar, P. Dadheech, S. Choudhary, Visvam Kumar, B. Panigrahi, K. Veluvolu (2020)
Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithmMicroprocess. Microsystems, 80
Journal of Computer Networks and Communications, 2016
Nishigandha Dutta, Moirangthem Singh (2018)
Wormhole Attack in Wireless Sensor Networks: A Critical ReviewAdvanced Computing and Communication Technologies
S. Mirjalili, A. Lewis (2016)
The Whale Optimization AlgorithmAdv. Eng. Softw., 95
B. Bhushan, G. Sahoo (2018)
Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor NetworksWireless Personal Communications, 98
International Journal of Emerging Technology and Advanced Engineering, 8
Priya Maidamwar, N. Chavhan (2012)
WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
Manish Kumar (2017)
Detection of Black Hole Attack in Wireless Sensor Networks Using Support Vector MachineInternational Journal for Research in Applied Science and Engineering Technology
Taranpreet Kaur, Rajeev Kumar (2018)
Mitigation of Blackhole Attacks and Wormhole Attacks in Wireless Sensor Networks Using AODV Protocol2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE)
Rajakumar Boothalingam (2018)
Optimization using lion algorithm: a biological inspiration from lion’s social behaviorEvolutionary Intelligence, 11
Xiao Luo, Yanru Chen, Miao Li, Qian Luo, Kang Xue, Shijia Liu, Liangyin Chen (2019)
CREDND: A Novel Secure Neighbor Discovery Algorithm for Wormhole AttackIEEE Access, 7
Suyash Bhardwaj, Vivek Kumar (2020)
Secure co-operative neighbour-based approach for detection and prevention of black hole attack in wireless mobile ad-hoc networksInt. J. Wirel. Mob. Comput., 19
Snehal Dongare, Ramchandra Mangrulkar (2016)
Optimal Cluster Head Selection Based Energy Efficient Technique for Defending against Gray Hole and Black Hole Attacks in Wireless Sensor NetworksProcedia Computer Science, 78
S. Reddy (2020)
Wormhole Detection Mechanism in Wireless Sensor Networks
Priya Maidamwar (2012)
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network, 2
J. Deny, A. Kumar, M. Sundarajan, Vishal Khanna (2017)
Defensive against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)
Muhammad Abbasi, Anum Rashad, Anas Basalamah, M. Tariq (2019)
Detection of Epilepsy Seizures in Neo-Natal EEG Using LSTM ArchitectureIEEE Access, 7
Aditya Bhawsar, Yogadhar Pandey, Upendra Singh (2020)
Detection and Prevention of Wormhole Attack using the Trust-based Routing System2020 International Conference on Electronics and Sustainable Communication Systems (ICESC)
M. Premkumar, T. Sundararajan (2020)
DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networksMicroprocess. Microsystems, 79
Anastasia Tsiota, Dionysis Xenakis, N. Passas, L. Merakos (2019)
On Jamming and Black Hole Attacks in Heterogeneous Wireless NetworksIEEE Transactions on Vehicular Technology, 68
Haomeng Xie, Zheng Yan, Zhen Yao, Mohammed Atiquzzaman (2019)
Data Collection for Security Measurement in Wireless Sensor Networks: A SurveyIEEE Internet of Things Journal, 6
This study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model. Here, different phases are included such as assigning the nodes, data collection, detecting black hole and wormhole attacks and preventing black hole and wormhole attacks by optimal path communication. Initially, a set of nodes is assumed for carrying out the communication in WSN. Further, the black hole attacks are detected by the Bait process, and wormhole attacks are detected by the round trip time (RTT) validation process. The data collection procedure is done with the Bait and RTT validation process with attribute information. The gathered data attributes are given for the training in which long short-term memory (LSTM) is used that includes the attack details. This is used for attack detection process. Once they are detected, those attacks are removed from the network using the optimal path selection process. Here, the optimal shortest path is determined by the improvement in the whale optimization algorithm (WOA) that is called as fitness rate-based whale optimization algorithm (FR-WOA). This shortest path communication is carried out based on the multi-objective function using energy, distance, delay and packet delivery ratio as constraints.Design/methodology/approachThis paper implements a detection and prevention of attacks model based on FR-WOA algorithm for the prevention of attacks in the WSNs. With this, this paper aims to accomplish the desired optimization of multi-objective functions.FindingsFrom the analysis, it is found that the accuracy of the optimized LSTM is better than conventional LSTM. The energy consumption of the proposed FR-WOA with 35 nodes is 7.14% superior to WOA and FireFly, 5.7% superior to grey wolf optimization and 10.3% superior to particle swarm optimization.Originality/valueThis paper develops the FR-WOA with optimized LSTM detecting and preventing black hole and wormhole attacks from WSN. To the best of the authors’ knowledge, this is the first work that uses FR-WOA with optimized LSTM detecting and preventing black hole and wormhole attacks from WSN.
International Journal of Pervasive Computing and Communications – Emerald Publishing
Published: Jan 6, 2023
Keywords: Wireless sensor networks; Black hole attacks; Wormhole attacks; Fitness rate-based whale optimization algorithm; Long term short memory; Bait process; Round trip time; Shortest path communication; Multi-objective function
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.