A Novel Machine Learning Algorithm for MANET Attack: Black Hole and Gray Hole

IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Wireless Personal Communications Pub Date : 2024-08-19 DOI:10.1007/s11277-024-11360-4
Mukul Shukla, Brijendra Kumar Joshi, Upendra Singh
{"title":"A Novel Machine Learning Algorithm for MANET Attack: Black Hole and Gray Hole","authors":"Mukul Shukla, Brijendra Kumar Joshi, Upendra Singh","doi":"10.1007/s11277-024-11360-4","DOIUrl":null,"url":null,"abstract":"<p>Mobile ad hoc networks (MANETs) are a class of wireless networks that can be operated without a fixed infrastructure. Due to the dynamics of decentralised systems, these networks are prone to different attacks like Black Hole Attack (BHA) and Gray Hole Attack (GHA). The basic requirement in this network is that all nodes are trusted nodes, but in a real-life scenario, some nodes may be malicious, so instead of transferring the data packet to the destination, it drops the data packet. Organisations have some ideas for preventing this attack but can fail due to improper methods, so the attack must be identified and addressed. This article uses the deep learning algorithm concept with a mutation-based artificial neural network (MBNN). It uses a swarm-based Cluster-Based Artificial Bee Colony (CBABC) optimisation technique to protect this network from BHA and GHA attacks. The proposed models performance has been improved by selecting the appropriate and best node for sending data packets. We have demonstrated experimental results suggesting that the proposed protocol outperforms existing work in the case of black and gray hole attacks.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"13 1","pages":""},"PeriodicalIF":1.9000,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11360-4","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Mobile ad hoc networks (MANETs) are a class of wireless networks that can be operated without a fixed infrastructure. Due to the dynamics of decentralised systems, these networks are prone to different attacks like Black Hole Attack (BHA) and Gray Hole Attack (GHA). The basic requirement in this network is that all nodes are trusted nodes, but in a real-life scenario, some nodes may be malicious, so instead of transferring the data packet to the destination, it drops the data packet. Organisations have some ideas for preventing this attack but can fail due to improper methods, so the attack must be identified and addressed. This article uses the deep learning algorithm concept with a mutation-based artificial neural network (MBNN). It uses a swarm-based Cluster-Based Artificial Bee Colony (CBABC) optimisation technique to protect this network from BHA and GHA attacks. The proposed models performance has been improved by selecting the appropriate and best node for sending data packets. We have demonstrated experimental results suggesting that the proposed protocol outperforms existing work in the case of black and gray hole attacks.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
针对城域网攻击的新型机器学习算法:黑洞和灰洞
移动特设网络(MANET)是一类可以在没有固定基础设施的情况下运行的无线网络。由于分散系统的动态性,这些网络容易受到不同的攻击,如黑洞攻击(BHA)和灰洞攻击(GHA)。这种网络的基本要求是所有节点都是可信节点,但在现实生活中,有些节点可能是恶意的,因此它不会将数据包传输到目的地,而是丢弃数据包。各组织都有一些预防这种攻击的想法,但由于方法不当,可能会失败,因此必须识别并解决这种攻击。本文采用基于突变的人工神经网络(MBNN)的深度学习算法概念。它使用基于蜂群的群集人工蜂群(CBABC)优化技术来保护该网络免受 BHA 和 GHA 攻击。通过选择合适的最佳节点发送数据包,改进了所提议模型的性能。我们的实验结果表明,在黑洞和灰洞攻击的情况下,所提出的协议优于现有的工作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Wireless Personal Communications
Wireless Personal Communications 工程技术-电信学
CiteScore
5.80
自引率
9.10%
发文量
663
审稿时长
6.8 months
期刊介绍: The Journal on Mobile Communication and Computing ... Publishes tutorial, survey, and original research papers addressing mobile communications and computing; Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia; Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.; 98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again. Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures. In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment. The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.
期刊最新文献
Capacity Analysis of a WLAN Cell Using VoWiFi Service for CBR Traffic Telecardiology in “New Normal” COVID-19: Efficacy of Neuro-Metaheuristic Session Key (NMSK) and Encryption Through Bipartite New State-of-Art Sharing A Robust Bias Reduction Method with Geometric Constraint for TDOA-Based Localization Variable Speed Drive Applications Performing Effectively with ANN Technique HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1