Please use this identifier to cite or link to this item: http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30076
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNwankwo, K. E.-
dc.contributor.authorAbdulhamid, S. M.-
dc.contributor.authorOjeniyi, Joseph Adebayo-
dc.contributor.authorMisra, S-
dc.contributor.authorOluranti, J.-
dc.contributor.authorAhuja, R.-
dc.date.accessioned2025-07-31T16:09:36Z-
dc.date.available2025-07-31T16:09:36Z-
dc.date.issued2020-
dc.identifier.urihttp://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30076-
dc.description.abstractSmall sensor nodes with the capability to sense and process data make up a wireless sensor network (WSN). This environment has limitations of low energy, low computational power and simple routing protocols; making is sus ceptible to attacks such as sinkhole attack. This attack happens when the enemy node in the network camouflages as a genuine node nearest to the base station, thereby have information sent by a source node to another destination node travel through it, giving it chance to alter, drop or delay information from reaching to the base station as intended. In our paper, the research developed a sinkhole detection technique, an enhancement of ant colony optimization by including a hash table in the ant colony optimization technique to advance sinkhole attack detection and reduce fa1se alarm rate in a wireless sensor network. An increase in the detection rate of 96% was achieved and result out performed other related research works when compared and further research discusseden_US
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.relation.ispartofseries78 - 87;-
dc.subjectAnt colony optimization · Swarm intelligence · Sinkhole detection · Wireless sensor networken_US
dc.titleA Panacea to soft computing approach for Sinkhole attack classification in a wireless sensor networks environmenten_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
A_Panacea_to_Soft_Computing_Approach_for.pdf1.79 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.