Detection of Attacks on Wireless Sensor Network Using Genetic Algorithms Based on Fuzzy

被引:0
作者
Al Hayali, Shaymaa [1 ]
Ucan, Osman [1 ]
Rahebi, Javad [2 ]
Bayat, Oguz [1 ]
机构
[1] Altinbas Univ, Istanbul, Turkey
[2] Turkish Aeronaut Assoc Univ, Ankara, Turkey
来源
INTERNATIONAL JOURNAL OF RENEWABLE ENERGY DEVELOPMENT-IJRED | 2019年 / 8卷 / 01期
关键词
wireless sensor network; fuzzy; genetic algorithm; detection of attack; malicious node; CLUSTERING ALGORITHMS;
D O I
10.14710/ijred.8.1.57-64
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
In this paper an individual - suitable function calculating design for WSNs is conferred. A multi-agent-located construction for WSNs is planned and an analytical type of the active combination is built for the function appropriation difficulty. The purpose of this study is to identify the threats identified by clustering genetic algorithms in clustering networks, which will prolong network lifetime. In addition, optimal routing is done using the fuzzy function. Simulation results show that the simulated genetic algorithm improves diagnostic speed and improves energy consumption. (c) 2019. CBIORE-IJRED. All rights reserved
引用
收藏
页码:57 / 64
页数:8
相关论文
共 35 条
[1]   A survey on clustering algorithms for wireless sensor networks [J].
Abbasi, Ameer Ahmed ;
Younis, Mohamed .
COMPUTER COMMUNICATIONS, 2007, 30 (14-15) :2826-2841
[2]  
Abdelhak S., 2010, CIRC SYST MWSCAS 201
[3]  
Agah A., 2004, NETW COMP APPL 2004
[4]   Routing techniques in wireless sensor networks: A survey [J].
Al-Karaki, JN ;
Kamal, AE .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (06) :6-28
[5]  
Anandh S. J., 2016, CIRCUIT SYSTEMS SCI
[6]  
[Anonymous], 2006, ACM Transactions on Sensor Networks, DOI [10.1145/1218556.1218559, DOI 10.1145/1218556.1218559]
[7]  
[Anonymous], 2004, P 3 INT S INF PROC S
[8]  
Arboleda L. M., 2006, EL COMP ENG 2006 CCE
[9]  
Banerjee S., 2007, DEFENDING SYBIL ATTA
[10]   A survey on clustering algorithms for wireless sensor networks [J].
Boyinbode, Olutayo ;
Le, Hanh ;
Takizawa, Makoto .
INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2011, 1 (1-3) :130-136