Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm

Nikitina Vlada, Raúl A. Sánchez-Ancajima, Miguel Ángel Torres Rubio, Walter Antonio Campos- Ugaz, Anibal Mejía Benavides, María Del Rocío Hende-Santolaya, Jacqueline C. Ponce-Meza
{"title":"Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm","authors":"Nikitina Vlada, Raúl A. Sánchez-Ancajima, Miguel Ángel Torres Rubio, Walter Antonio Campos- Ugaz, Anibal Mejía Benavides, María Del Rocío Hende-Santolaya, Jacqueline C. Ponce-Meza","doi":"10.58346/jowua.2023.i3.006","DOIUrl":null,"url":null,"abstract":"Wireless technologies have grown in popularity and are used in many applications. Transient Mobile Ad hoc Networks (MANETs) serve specific goals without infrastructure. The dynamism of these networks makes them useful for ubiquitous computing. However, high mobility, the lack of a centralized authority, and open media make MANETs vulnerable to various security risks. Thus, an Intrusion Detection System (IDS) should be used to monitor and detect system security issues. To prevent and improve security against unauthorized access, intrusion screening is crucial. The depletion of a mobile node's power supply can impact its capacity to transmit packets, as this functionality is contingent upon the system's overall lifespan. Computational Optimization-driven solutions have been prevalent in the context of IDS and secure routing inside MANETs. This research employs the Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm (EPSO-IDSRA). Enhanced Particle Swarm Optimization technique (EPSO) has provided confidence-based, secure, and energy-efficient routing in MANETs. The EPSO technique is applied to identify optimal hops for enhancing the routing process. The initial step involves the activation of the fuzzy clustering algorithm, followed by selecting Cluster Heads (CHs) based on assessing their indirect, direct, and recent confidence values. Furthermore, the identification of value nodes was contingent upon assessing confidence levels. Also, the CHs are involved in multi-hop routing, and determining the optimal route depends on the anticipated protocol, which chooses the most favorable paths considering factors such as latency, throughput, and connectivity within the designated area. The EPSO method, presented for secure routing (at time 50ms), yielded an optimal energy consumption of 0.15 millijoules, a minimal delay of 0.008 milliseconds, a maximum throughput of 0.8 bits per second, and an 89% detection rate.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58346/jowua.2023.i3.006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

Wireless technologies have grown in popularity and are used in many applications. Transient Mobile Ad hoc Networks (MANETs) serve specific goals without infrastructure. The dynamism of these networks makes them useful for ubiquitous computing. However, high mobility, the lack of a centralized authority, and open media make MANETs vulnerable to various security risks. Thus, an Intrusion Detection System (IDS) should be used to monitor and detect system security issues. To prevent and improve security against unauthorized access, intrusion screening is crucial. The depletion of a mobile node's power supply can impact its capacity to transmit packets, as this functionality is contingent upon the system's overall lifespan. Computational Optimization-driven solutions have been prevalent in the context of IDS and secure routing inside MANETs. This research employs the Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm (EPSO-IDSRA). Enhanced Particle Swarm Optimization technique (EPSO) has provided confidence-based, secure, and energy-efficient routing in MANETs. The EPSO technique is applied to identify optimal hops for enhancing the routing process. The initial step involves the activation of the fuzzy clustering algorithm, followed by selecting Cluster Heads (CHs) based on assessing their indirect, direct, and recent confidence values. Furthermore, the identification of value nodes was contingent upon assessing confidence levels. Also, the CHs are involved in multi-hop routing, and determining the optimal route depends on the anticipated protocol, which chooses the most favorable paths considering factors such as latency, throughput, and connectivity within the designated area. The EPSO method, presented for secure routing (at time 50ms), yielded an optimal energy consumption of 0.15 millijoules, a minimal delay of 0.008 milliseconds, a maximum throughput of 0.8 bits per second, and an 89% detection rate.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
增强移动自组织网络的安全性:增强粒子群优化驱动的入侵检测和安全路由算法
无线技术越来越受欢迎,并在许多应用中使用。瞬态移动自组织网络(manet)在没有基础设施的情况下服务于特定目标。这些网络的动态性使它们对普适计算很有用。然而,高移动性、缺乏中央权威和开放媒体使得manet容易受到各种安全风险的影响。因此,应该使用入侵检测系统(IDS)来监视和检测系统安全问题。为了防止和提高对未经授权访问的安全性,入侵筛选至关重要。移动节点的电源耗尽会影响其传输数据包的能力,因为该功能取决于系统的整体寿命。计算优化驱动的解决方案在IDS和manet内部的安全路由环境中非常流行。本研究采用增强粒子群优化驱动的入侵检测与安全路由算法(EPSO-IDSRA)。增强粒子群优化技术(Enhanced Particle Swarm Optimization technology, EPSO)提供了基于信任、安全、节能的多网路由。采用EPSO技术来识别最优跳数,以提高路由过程。初始步骤包括激活模糊聚类算法,然后根据评估其间接、直接和最近的置信度值选择簇头(CHs)。此外,价值节点的识别取决于评估置信水平。此外,CHs还涉及到多跳路由,确定最优路由取决于预期的协议,该协议考虑到指定区域内的延迟、吞吐量和连通性等因素,选择最有利的路径。EPSO方法用于安全路由(时间为50ms),产生的最佳能耗为0.15毫焦耳,最小延迟为0.008毫秒,最大吞吐量为每秒0.8位,检测率为89%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
4.40
自引率
0.00%
发文量
0
期刊介绍: JoWUA is an online peer-reviewed journal and aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to wireless mobile networks, ubiquitous computing, and their dependable applications. JoWUA consists of high-quality technical manuscripts on advances in the state-of-the-art of wireless mobile networks, ubiquitous computing, and their dependable applications; both theoretical approaches and practical approaches are encouraged to submit. All published articles in JoWUA are freely accessible in this website because it is an open access journal. JoWUA has four issues (March, June, September, December) per year with special issues covering specific research areas by guest editors.
期刊最新文献
Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications Performance Evaluation of Collision Avoidance for Multi-node LoRa Networks based on TDMA and CSMA Algorithm Human-Centric AI : Enhancing User Experience through Natural Language Interfaces A Study on the Implementation of a Network Function for Real-time False Base Station Detection for the Next Generation Mobile Communication Environment Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1