Simulating Fruit Fly Optimization Algorithm in Calculation of Energy Cost with respect to Multipath Routing for Node Capture Attack in WSN
Ruby Bhatt1, Priti Maheshwary2, Piyush Shukla3

1Ruby Bhatt, Department of Computer Science & Engineering, Rabindranath Tagore University, Formerly Known as AISECT University, Bhopal (M.P), India.
2Priti Maheshwary, Department of Computer Science & Engineering, Rabindranath Tagore University, Formerly known as AISECT University, Bhopal (M.P), India.
3Piyush Kumar Shukla, Department of Computer Science & Engineering, UIT, RGPV, Bhopal (M.P), India.
Manuscript received on 12 December 2018 | Revised Manuscript received on 23 December 2018 | Manuscript published on 30 December 2018 | PP: 62-65 | Volume-8 Issue-2, December 2018 | Retrieval Number: B2542128218/18©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The concept of ‘Smart’ has made sensors very much prominent in one’s life. In this smart world, Wireless sensor network (WSN) [1]is another area of interest. There are good side and bad side of coin when dealt with WSN. Good side of WSN has made its presence felt in various areas but bad side has made it susceptible to different types of physical attacks. It is collection of tiny sized sensor nodes. And the tiny sensor nodes have limited resource capacity. It is screened to external atmosphere for circulating data. But, due to its mobile nature, nodes are susceptible for many types of attacks. Node capture attack is supposed to be severe attack in WSN [2]. In this type, the node is substantially captured by an assailant and eradicates the secret information from the node`s storage. This paper proposes aFruit Fly Optimization Algorithm (FFOA) [13]. It is based on multiple objectives [4] node capture attack algorithm.Proposed algorithm serves these objectives: maximum node contribution [4], maximum key contribution [4], and leastresource expenses [4].Routing can be single path or it may be multipath. The simulation result illustrates that FFOA obtains a lower energy cost andlower attacking roundsas compared with matrix algorithm (MA) [5] and other node capture attack algorithms for multipath routing. 
Keyword: Vertex, Seizure, Fruit Fly, Optimization, Capture, Vulnerable.
Scope of the Article: Wireless ad hoc & Sensor Networks