2021
DOI: 10.1007/978-981-33-4968-1_47
|View full text |Cite
|
Sign up to set email alerts
|

A Black Widow Optimization Algorithm (BWOA) for Node Capture Attack to Enhance the Wireless Sensor Network Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Table 1 provides an overview of the simulation parameters, which include the number of sensor nodes (250), the network area dimensions (100 m * 100 m), the number of source nodes (20), the transmission range (tx_rng, 25), the number of destination nodes (7), the number of keys (K, 250), the population size of Grey Wolves (n, 250), and the number of repetitions (iterations, 250) [16].…”
Section: Simulation and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Table 1 provides an overview of the simulation parameters, which include the number of sensor nodes (250), the network area dimensions (100 m * 100 m), the number of source nodes (20), the transmission range (tx_rng, 25), the number of destination nodes (7), the number of keys (K, 250), the population size of Grey Wolves (n, 250), and the number of repetitions (iterations, 250) [16].…”
Section: Simulation and Resultsmentioning
confidence: 99%
“…(a) Resource Allocation: GWO efficiently allocates resources within the WSN, optimizing energy consumption and reducing operational costs. (b) Node Placement: It optimizes node placement to ensure maximum coverage and efficient data collection [7]. (c) Data Transmission Efficiency: GWO enhances data transmission efficiency, reducing delays and improving overall system performance.…”
Section: Application In Security Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…This node capture attack was identified by using several optimization methodologies [45] and reduced the harmful effects of attacks over WSN. The GWOA (Grey Wolf Optimization Algorithm) [46] was well utilized for determining the malicious nodes optimally with the help of node`s characteristics such as stability and contribution. The outcomes describe the superior efficiency of GWOA based on traffic compromise, power expenses and attacking time against ACO (Ant Colony Optimization) and prior methods.…”
Section: Literature Reviewmentioning
confidence: 99%
“…(5) [21]. Following the detection of overload and underload hosts, the next step is to schedule VM hosts using algorithm.…”
Section: Dcp � 1 Pepmentioning
confidence: 99%