Host-based Detection and Prevention of Black Hole Attacks by AODV-ICCSO Algorithm for Security in MANETs

IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Ad Hoc & Sensor Wireless Networks Pub Date : 2021-07-20 DOI:10.21203/rs.3.rs-188928/v1
P. Sathyaraj, S. Rukmani Devi, K. Kannan
{"title":"Host-based Detection and Prevention of Black Hole Attacks by AODV-ICCSO Algorithm for Security in MANETs","authors":"P. Sathyaraj, S. Rukmani Devi, K. Kannan","doi":"10.21203/rs.3.rs-188928/v1","DOIUrl":null,"url":null,"abstract":"\n Background: Mobile Ad-hoc Networks (i.e.) MANETs are gaining rapid fame in recent days and are considered as very significant because of their easier implementation and growing property. Various types of attacks are prone to damage the networks due to the elastic property possessed by the network. And among different categories of attacks that can affect MANETs, black hole attack is considered as the commonly occurring one within a MANET. Chicken Swarm Optimization (CSO) algorithm is one among the technique used for the detection of black hole attacks occurring in the MANETs. But the CSO algorithm possesses some disadvantages and necessity rises for overcoming the weakness in the CSO algorithm. Objective: Therefore, in this research paper, to address the black hole attack in MANET, an Improved Crossover Chicken Swarm Optimization (ICCSO) algorithm and the concept of Enhanced Partially-Mapped Crossover operation proposed and the best fitness values obtained. Methods: In ICCSO algorithm, parameter initialization is carried out in step 1 of the algorithm, where the attacked nodes and non-attack nodes are created separately with the aid of parameters like PDR (i.e.) Packet Delivery Ratio and RSSI (i.e.) Received Signal Strength Indicator. Further, If the node is affected by any attack, then the nodes are discarded and the data is transmitted through the non-attacked node. Routing is carried by a protocol of AODV.Results: The effectiveness of the algorithm proposed in the work is evaluated using various performance measures like packet delivery ratio (PDR), end-to-end delay (EED) and throughput. The performance measures are compared with a different state of the art routing protocols and it can be inferred that the proposed methodology comes up with improved results.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2021-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc & Sensor Wireless Networks","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.21203/rs.3.rs-188928/v1","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 1

Abstract

Background: Mobile Ad-hoc Networks (i.e.) MANETs are gaining rapid fame in recent days and are considered as very significant because of their easier implementation and growing property. Various types of attacks are prone to damage the networks due to the elastic property possessed by the network. And among different categories of attacks that can affect MANETs, black hole attack is considered as the commonly occurring one within a MANET. Chicken Swarm Optimization (CSO) algorithm is one among the technique used for the detection of black hole attacks occurring in the MANETs. But the CSO algorithm possesses some disadvantages and necessity rises for overcoming the weakness in the CSO algorithm. Objective: Therefore, in this research paper, to address the black hole attack in MANET, an Improved Crossover Chicken Swarm Optimization (ICCSO) algorithm and the concept of Enhanced Partially-Mapped Crossover operation proposed and the best fitness values obtained. Methods: In ICCSO algorithm, parameter initialization is carried out in step 1 of the algorithm, where the attacked nodes and non-attack nodes are created separately with the aid of parameters like PDR (i.e.) Packet Delivery Ratio and RSSI (i.e.) Received Signal Strength Indicator. Further, If the node is affected by any attack, then the nodes are discarded and the data is transmitted through the non-attacked node. Routing is carried by a protocol of AODV.Results: The effectiveness of the algorithm proposed in the work is evaluated using various performance measures like packet delivery ratio (PDR), end-to-end delay (EED) and throughput. The performance measures are compared with a different state of the art routing protocols and it can be inferred that the proposed methodology comes up with improved results.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于AODV-ICCSO算法的基于主机的黑洞攻击检测与防范
背景:移动自组织网络(即)manet最近获得了迅速的名声,并且由于其更容易实现和不断增长的特性而被认为是非常重要的。由于网络所具有的弹性特性,各种攻击都容易对网络造成破坏。在影响MANET的不同类型的攻击中,黑洞攻击被认为是MANET中最常见的攻击。鸡群优化算法(CSO)是一种用于检测黑洞攻击的技术。但是CSO算法也存在一些缺点,需要克服CSO算法的缺点。为此,本文针对MANET中的黑洞攻击问题,提出了一种改进的交叉鸡群优化(ICCSO)算法和增强部分映射交叉操作的概念,并获得了最佳适应度值。方法:在ICCSO算法中,在算法的第一步进行参数初始化,通过PDR (Packet Delivery Ratio)、RSSI (Received Signal Strength Indicator)等参数分别创建受攻击节点和非受攻击节点。如果该节点受到任何攻击,则丢弃该节点,数据通过未受攻击的节点传输。路由由AODV协议承载。结果:使用各种性能指标,如分组传输比(PDR)、端到端延迟(EED)和吞吐量,对工作中提出的算法的有效性进行了评估。性能指标与不同状态的最先进的路由协议进行了比较,可以推断,所提出的方法提出了改进的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Ad Hoc & Sensor Wireless Networks
Ad Hoc & Sensor Wireless Networks 工程技术-电信学
CiteScore
2.00
自引率
44.40%
发文量
0
审稿时长
8 months
期刊介绍: Ad Hoc & Sensor Wireless Networks seeks to provide an opportunity for researchers from computer science, engineering and mathematical backgrounds to disseminate and exchange knowledge in the rapidly emerging field of ad hoc and sensor wireless networks. It will comprehensively cover physical, data-link, network and transport layers, as well as application, security, simulation and power management issues in sensor, local area, satellite, vehicular, personal, and mobile ad hoc networks.
期刊最新文献
Enumeration of the Number of Spanning Trees of the Globe Network and its Subdivision A HYBRID OPTIMIZATION ALGORITHMS FOR SOLVING METRIC DIMENSION PROBLEM Detecting Malicious Use of DoH Tunnels Using Statistical Traffic Analysis RPL+: An Improved Parent Selection Strategy for RPL in Wireless Smart Grid Networks Prototype of deployment of Federated Learning with IoT devices
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1