Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

Implementation of fruit fly optimization algorithm (FFOA) to escalate the attacking efficiency of node capture attack in wireless sensor networks (WSN)

R Bhatt, P Maheshwary, P Shukla, P Shukla… - Computer …, 2020 - Elsevier
Wireless sensor network (WSN) is a group of a huge number of low price, low control, and
self-organizing specialized sensor nodes. WSN is very much vulnerable to different types of …

Improving the protection of wireless sensor network using a black hole optimization algorithm (BHOA) on best feasible node capture attack

A Khare, R Gupta, PK Shukla - IoT and Analytics for Sensor Networks …, 2022 - Springer
Abstract Wireless Sensor Network (WSN) is an area of research that connects mutually huge
subareas of communication, routing, security, and attacks. WSN is conceivably the most …

Application of fruit fly optimization algorithm for single-path routing in wireless sensor network for node capture attack

R Bhatt, P Maheshwary, P Shukla - Computing and Network Sustainability …, 2019 - Springer
Wireless sensor network (WSN)(Kaur and Kang in Int J Comput Sci Eng IJCSE 6 (4): 157–
162, 2016,[1]) is susceptible to different types of physical attacks. It is collection of tiny-sized …

MREA: a minimum resource expenditure node capture attack in wireless sensor networks

C Lin, T Qiu, MS Obaidat, CW Yu… - Security and …, 2016 - Wiley Online Library
Because of the stochastic key pre‐distribution and complicated network topology, designing
an energy‐efficient node capture attack algorithm is of great challenge. Although many …

An obfuscatable aggregatable signcryption scheme for unattended devices in IoT systems

Y Shi, J Han, X Wang, J Gao… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Signcryption is a cryptographic technique for simultaneously performing both digital
signature and data encryption. It is effective for protecting the confidentiality and …

A multi objective optimization modeling in WSN for enhancing the attacking efficiency of node capture attack

P Ahlawat, R Bathla - … Journal of System Assurance Engineering and …, 2023 - Springer
Node capture attacks compromise the integrity and confidentiality of networks by capturing
nodes within them and obtaining cryptographic keys through wireless sensor network links …

A hybrid approach for path vulnerability matrix on random key predistribution for wireless sensor networks

P Ahlawat, M Dave - Wireless Personal Communications, 2017 - Springer
In this paper, we address the problem of physical node capture attack from an adversarial
view. In this type of attack, an adversary intelligently captures the node (s) and extracts the …

A node selecting approach for traffic network based on artificial slime mold

Z Cai, Z **ong, K Wan, Y Xu, F Xu - IEEE Access, 2020 - ieeexplore.ieee.org
The node selecting problem of traffic network is a significant issue and is difficult to be
solved. In this paper, an artificial slime mold method is proposed to help us solve the …

FW-PSO algorithm to enhance the invulnerability of industrial wireless sensor networks topology

Y Zhang, G Yang, B Zhang - Sensors, 2020 - mdpi.com
When an industrial wireless sensor network (WSN) is seriously disturbed and intentionally
attacked, sometimes it fails easily, even leading to the paralysis of the entire industrial …