Please use this identifier to cite or link to this item:
http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30076
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nwankwo, K. E. | - |
dc.contributor.author | Abdulhamid, S. M. | - |
dc.contributor.author | Ojeniyi, Joseph Adebayo | - |
dc.contributor.author | Misra, S | - |
dc.contributor.author | Oluranti, J. | - |
dc.contributor.author | Ahuja, R. | - |
dc.date.accessioned | 2025-07-31T16:09:36Z | - |
dc.date.available | 2025-07-31T16:09:36Z | - |
dc.date.issued | 2020 | - |
dc.identifier.uri | http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30076 | - |
dc.description.abstract | Small sensor nodes with the capability to sense and process data make up a wireless sensor network (WSN). This environment has limitations of low energy, low computational power and simple routing protocols; making is sus ceptible to attacks such as sinkhole attack. This attack happens when the enemy node in the network camouflages as a genuine node nearest to the base station, thereby have information sent by a source node to another destination node travel through it, giving it chance to alter, drop or delay information from reaching to the base station as intended. In our paper, the research developed a sinkhole detection technique, an enhancement of ant colony optimization by including a hash table in the ant colony optimization technique to advance sinkhole attack detection and reduce fa1se alarm rate in a wireless sensor network. An increase in the detection rate of 96% was achieved and result out performed other related research works when compared and further research discussed | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.relation.ispartofseries | 78 - 87; | - |
dc.subject | Ant colony optimization · Swarm intelligence · Sinkhole detection · Wireless sensor network | en_US |
dc.title | A Panacea to soft computing approach for Sinkhole attack classification in a wireless sensor networks environment | en_US |
dc.type | Article | en_US |
Appears in Collections: | Cyber Security Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
A_Panacea_to_Soft_Computing_Approach_for.pdf | 1.79 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.