2015 IEEE International Conference on Systems, Man, and Cybernetics 2015
DOI: 10.1109/smc.2015.17
|View full text |Cite
|
Sign up to set email alerts
|

A Wormhole Attacks Detection Using a QTS Algorithm with MA in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Compared with other traditional evolutionary algorithms [9]- [11], such as GAs, PSO, the tabu search, and QIEAs [55]- [57], and the quantuminspired electromagnetism-like mechanism (QEM) [58], the QTS [16] algorithm shows much better performance on both the 0/1 knapsack problem and the traveling salesman problem. Moreover, the QTS algorithm has been applied to many combinatorial optimization problems and used in real world application, such as function optimization [17], [59], deployment in wireless sensor networks (WSNs) [60], wormhole attack detection [61], stock selection [62], stock trading [63], [64], and reversible circuit synthesis [65]. The QTS algorithm demonstrates better results than other traditional optimization methods for these optimization problems.…”
Section: Related Workmentioning
confidence: 99%
“…Compared with other traditional evolutionary algorithms [9]- [11], such as GAs, PSO, the tabu search, and QIEAs [55]- [57], and the quantuminspired electromagnetism-like mechanism (QEM) [58], the QTS [16] algorithm shows much better performance on both the 0/1 knapsack problem and the traveling salesman problem. Moreover, the QTS algorithm has been applied to many combinatorial optimization problems and used in real world application, such as function optimization [17], [59], deployment in wireless sensor networks (WSNs) [60], wormhole attack detection [61], stock selection [62], stock trading [63], [64], and reversible circuit synthesis [65]. The QTS algorithm demonstrates better results than other traditional optimization methods for these optimization problems.…”
Section: Related Workmentioning
confidence: 99%
“…Traditional wireless networks do not have as many limitations as WSN, which is why the implementation of security mechanisms is not an easy task [44], and many authors ignore this aspect in their proposals. The wireless sensor network, as compared to traditional computer networks, has certain limitations that are highlighted in [124], including:…”
Section: Security Threatsmentioning
confidence: 99%
“…Table 9 shows the different topologies used by each proposal, whether the proposal makes an analysis or takes into account the detection of false positives, and also if it detects and prevents the SF attack. Ad-Hoc WSN Yes Yes No [28] Cluster/Tree No Yes No [44] Ad-Hoc WSN No Yes No [14] MANET No Yes Yes [84] MANET No Yes Yes [117] MANET Yes Yes Yes [1] MANET Yes Yes Yes [56] MANET No Yes Yes [20] Ad-Hoc WSN No Yes Yes [33] MANET No Yes Yes [39] MANET No Yes Yes [59] Cluster/Tree No Yes No [118] MANET Yes Yes No [85] Mesh No Yes Yes [8] VANET No No Yes [121] MANET No Yes Yes [29] Cluster/Tree No Yes Yes [140] Ad-Hoc WSN No Yes No [127] Cluster/Tree Yes Yes Yes [108] Ad-Hoc WSN No Yes No [126] Ad-Hoc WSN No Yes Yes [20] Ad-Hoc WSN No Yes Yes [21] Cluster/Tree No Yes Yes [70] Cluster/Tree No Yes Yes [129] Cluster/Tree Yes Yes Yes Table 10 shows which of the metrics found throughout this bibliographic review were used by each proposal. The most used metric to mitigate the sybil attack is power consumption, in fact, 12 proposals used this metric.…”
Section: Selective Forwarding Attackmentioning
confidence: 99%
“…They include attacks, selective forwarding, sinkholes, and wormholes, and are intended to induce an unwanted behavior in specific elements of WSNs through malicious nodes and traffic manipulation. These attacks are successful because they give an attacker the ability to intercept and modify data in real time, execute denials of service and selective forwarding attacks, store packets, inject false information into legitimate nodes and disrupt routing processes (Jao et al, 2015). The risks of wormhole attacks represent new security gaps that must be addressed and reduced to protect end users' data and privacy.…”
Section: Introductionmentioning
confidence: 99%