Instigating Fruit Fly Optimization for Node Capture Attack in calculating Energy Cost for Single Path Routing in Wireless Sensor Network


  • Ruby Bhatt Choithram College
  • Priti Maheshwary
  • Piyush Shukla





Vertex, Seizure, Fruit Fly, Optimization, Capturing, Vulnerable.


Wireless sensor network (WSN) [1]is susceptible to different types of physical attacks. It is collection of tiny sized sensor nodes. The reason behind that is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN [2]. In this type, the node is substantially captured by an assailant and eradicates the secret information from the node`s storage. This paper proposes Fruit Fly Optimization Algorithm (FFOA)[13]. It is based on multiple objectives [4] node capture attack algorithm. Proposed algorithm serves these objectives: maximum node contribution [4], maximum key contribution [4], and least resource expenses [4]. The simulation result illustrates that FFOA obtains a maximum fraction of compromised traffic, lower attacking rounds, and lower energy cost as compared with matrix algorithm (MA) [5] and other node capture attack algorithms.




[1] Amandeep Kaur and Sandeep Singh Kang, “Attacks in Wireless Sensor Network- A Reviewâ€, International Journal of Computer Sciences and Engineering, IJCSE, Vol. 6, Issue 4, pp-157-162, 2016.

[2] BhavanaButani, Piyush Kumar Shukla, and Sanjay Silakari, “An Exhaustive Survey on Physical Node Capture Attack in WSNâ€,International Journal of Computer Applications, IJCA, Volume 95, No.3, pp-32-39, 2014.

[3] Bhoopathy V. and R.M.S. Parvathi, “Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networksâ€, International Journal of Engineering Research and Applications, IJERA, Vol. 2, Issue 2, pp-466-474, 2012.

[4] Chi Lin andGuoweiWu, “Enhancing the attacking efficiency of the node captureattack in WSN: a matrix approachâ€, J Supercomput, Springer Science &Business Media, pp-1-19, 2013.

[5] Chi Lin, Guowei Wu, Chang Wu Yu, and Lin Yao, “Maximizing destructiveness of node capture attack in wireless sensor networksâ€, J Supercomput, Springer Science & Business Media, Vol. 71, pp-3181–3212, 2015.

[6] Chi Lin, Tie Qiu, Mohammad S. Obaidat, Chang Wu Yu, Lin Yao and Guowei Wu, “MREA: a minimum resource expenditure node capture attack in wireless sensor networksâ€, Security and Communication Networks, Wiley Online Library, Vol. 9, pp-5502–5517, 2016.

[7] Chuiwei Lu, and Defa Hu, “A Fault-Tolerant Routing Algorithm for Wireless SensorNetworks Based on the Structured Directional de Bruijn Graphâ€, Cybernetics and Information Technologies, Bulgarian Academy Of Sciences, Volume 16, No 2, pp-46-59, 2016.

[8] Daehee Kim, Dongwan Kim, and Sunshin An, “Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networksâ€, Sensors, MDPI, Vol. 16, pp-1 -22, 2016.

[9] Daehee Kim, Dongwan Kim and SunshinAn, “Communication Pattern Based Key Establishment Scheme in Heterogeneous Wireless Sensor Networksâ€, KSII Transactions on Internet and Information Systems, Vol. 10, No. 3, pp-1249-1272, 2016.

[10] Harpreet Kaur, “Node Replication attack detection using Dydog in Clustered sensor networkâ€, Computer Science and Engineering Department, Thapar University Patiala, pp-1-71, 2017.

[11] I. QasemzadehKolagar, H. Haj SeyyedJavadi, and M. Anzani, “Hypercube Bivariate-Based Key Management for Wireless Sensor Networksâ€, Journal of Sciences, Islamic Republic of Iran, University of Tehran, Vol. 28, No. 3, pp-273 – 285, 2017.

[12] R. Vijayarajeswari, A. Rajivkannan and J. Santosh, “Survey Of Malicious Node Detection In Wireless Sensor Networksâ€, International Journal of Emerging Technology and Innovative Engineering, Volume 2, Issue 6, pp-335-338, 2016.

[13] Ze Wang, Chang Zhou, and Yiran Liu, “Efficient Hybrid Detection of Node ReplicationAttacks in Mobile Sensor Networksâ€, Hindawi, Mobile Information Systems, pp-1-14, 2017.

[14] Xiao C., Hao K., Ding Y., “An Improved Fruit Fly Optimization Algorithm Inspired from Cell Communication Mechanismâ€, Hindawi Corporation, 2017.

[15] Tague P., “Identifying, modeling, and mitigating attacks in wireless adhoc and sensor networksâ€.

[16] W. Guowei, C. Xiaojie, S. Mohammad and L. Chi, “A high efficient node capture attack algorithm in wireless sensor network based on route minimum key setâ€.

View Full Article: