首页 > 最新文献

International Journal of Computer Networks and Applications最新文献

英文 中文
Intrusion Detection Systems for IoT Attack Detection and Identification Using Intelligent Techniques 基于智能技术的物联网攻击检测与识别入侵检测系统
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218517
Trifa S. Othman, Saman M. Abdullah
– The Internet of Things (IoT) and its connected objects have resource limitations, which lead to weak security concerns over the IoT infrastructures. Therefore, the IoT networks should always be attached with security solutions. One of the promising security solutions is intrusion detection system (IDS). Machine Learning (ML) algorithms become one of the most significant techniques for building an intelligent IDS based model for attack classification and/or identification. To keep the validation of the ML based IDS, it is essential to train the utilized ML algorithms with a dataset that cover most recent behaviors of IoT based attacks. This work employed an up-to-date dataset known as IoT23, which contains most recent network flows of the IoT objects as benign and other flows as attacks. This work utilized different data preprocessing theories such data cleansing, data coding, and SMOT theory for imbalanced data, and investigating their impact on the accuracy rate. The study's findings show that the intelligent IDS can effectively detect attacks using binary classification and identify attacks using multiclass classification.
-物联网(IoT)及其连接对象具有资源限制,导致物联网基础设施的安全性担忧较弱。因此,物联网网络应该始终附加安全解决方案。入侵检测系统(IDS)是一种很有前途的安全解决方案。机器学习(ML)算法成为构建基于攻击分类和/或识别的智能IDS模型的最重要技术之一。为了保持基于机器学习的IDS的有效性,必须使用涵盖基于物联网攻击最新行为的数据集来训练所使用的机器学习算法。这项工作采用了一个名为IoT23的最新数据集,其中包含了物联网对象的最新网络流(良性)和其他流(攻击)。本文利用不同的数据预处理理论,如数据清洗、数据编码和SMOT理论来处理不平衡数据,并研究了它们对准确率的影响。研究结果表明,智能入侵检测系统能够有效地利用二元分类方法检测攻击,利用多类分类方法识别攻击。
{"title":"Intrusion Detection Systems for IoT Attack Detection and Identification Using Intelligent Techniques","authors":"Trifa S. Othman, Saman M. Abdullah","doi":"10.22247/ijcna/2023/218517","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218517","url":null,"abstract":"– The Internet of Things (IoT) and its connected objects have resource limitations, which lead to weak security concerns over the IoT infrastructures. Therefore, the IoT networks should always be attached with security solutions. One of the promising security solutions is intrusion detection system (IDS). Machine Learning (ML) algorithms become one of the most significant techniques for building an intelligent IDS based model for attack classification and/or identification. To keep the validation of the ML based IDS, it is essential to train the utilized ML algorithms with a dataset that cover most recent behaviors of IoT based attacks. This work employed an up-to-date dataset known as IoT23, which contains most recent network flows of the IoT objects as benign and other flows as attacks. This work utilized different data preprocessing theories such data cleansing, data coding, and SMOT theory for imbalanced data, and investigating their impact on the accuracy rate. The study's findings show that the intelligent IDS can effectively detect attacks using binary classification and identify attacks using multiclass classification.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45700968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AFSORP: Adaptive Fish Swarm Optimization-Based Routing Protocol for Mobility Enabled Wireless Sensor Network AFSORP:基于自适应鱼群优化的移动无线传感器网络路由协议
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218516
D. Jayaraj, J. Ramkumar, M. Lingaraj, B. Sureshkumar
– Advances in information and communication technology and electronics have led to a surge in interest in mobility-enabled wireless sensor networks (MEWSN). These minuscule sensor nodes collect data, process it, and then transmit it via a radio frequency channel to a central station or sink. Most of the time, MEWSNs are placed in hazardous or difficult-to-access locations. To increase the lifespan of a network, available resources must be utilized as efficiently as possible. The whole network connection collapses if even one node loses power, rendering the deployment's goals moot. Therefore, much MEWSN research has focused on energy efficiency, with energy-efficient routing protocols being a key component. This paper proposes an Adaptive Fish Swarm Optimization-based Routing Protocol (AFSORP) for identifying the best route in MEWSN. AFSORP functions based on the natural characteristics of fish. The two most important steps in AFSORP are chasing and blocking, which respectively seek the optimal route and choose the appropriate route to send data from the source node to the destination node. Standard network performance measurements are used to assess AFSORP with the help of the GNS3 simulator. The results show that AFSORP performs better than the existing routing methods.
-信息通信技术和电子技术的进步导致人们对移动无线传感器网络(MEWSN)的兴趣激增。这些微小的传感器节点收集数据,对其进行处理,然后通过无线电频率通道将其传输到中央站或接收器。大多数情况下,mewsn被放置在危险或难以进入的位置。为了延长网络的寿命,必须尽可能有效地利用可用资源。即使只有一个节点断电,整个网络连接也会崩溃,从而使部署目标失去意义。因此,许多MEWSN的研究都集中在能源效率上,而节能路由协议是其中的关键组成部分。本文提出了一种基于自适应鱼群优化的路由协议(AFSORP)来识别MEWSN中的最佳路由。AFSORP功能是基于鱼类的自然特性。在AFSORP中最重要的两个步骤是追逐和阻塞,它们分别寻找最优路径,选择合适的路径将数据从源节点发送到目的节点。在GNS3模拟器的帮助下,使用标准网络性能测量来评估AFSORP。结果表明,该算法的性能优于现有的路由算法。
{"title":"AFSORP: Adaptive Fish Swarm Optimization-Based Routing Protocol for Mobility Enabled Wireless Sensor Network","authors":"D. Jayaraj, J. Ramkumar, M. Lingaraj, B. Sureshkumar","doi":"10.22247/ijcna/2023/218516","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218516","url":null,"abstract":"– Advances in information and communication technology and electronics have led to a surge in interest in mobility-enabled wireless sensor networks (MEWSN). These minuscule sensor nodes collect data, process it, and then transmit it via a radio frequency channel to a central station or sink. Most of the time, MEWSNs are placed in hazardous or difficult-to-access locations. To increase the lifespan of a network, available resources must be utilized as efficiently as possible. The whole network connection collapses if even one node loses power, rendering the deployment's goals moot. Therefore, much MEWSN research has focused on energy efficiency, with energy-efficient routing protocols being a key component. This paper proposes an Adaptive Fish Swarm Optimization-based Routing Protocol (AFSORP) for identifying the best route in MEWSN. AFSORP functions based on the natural characteristics of fish. The two most important steps in AFSORP are chasing and blocking, which respectively seek the optimal route and choose the appropriate route to send data from the source node to the destination node. Standard network performance measurements are used to assess AFSORP with the help of the GNS3 simulator. The results show that AFSORP performs better than the existing routing methods.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48340444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy-Preserving Mechanism to Secure IoT-Enabled Smart Healthcare System in the Wireless Body Area Network 在无线身体区域网络中保护物联网智能医疗系统的隐私保护机制
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217707
Renuka S. Pawar, D. Kalbande
The IoT has been a subclass of Industry 4.0 standards that is under research from the perspective of quality of service (QoS) & security. Due to the pandemic situations like novel coronavirus smart healthcare monitoring gained growing interest in detection. In IoT data is communicated from Intra WBAN (Wireless Body Area Network) to inter-WBAN and then beyond WBAN. While transferring data from one layer to the other end-to-end data privacy is the challenge to focus on. The privacy-preserving of patients' sensitive data is difficult due to their open nature and resource-constrained sensor nodes. The proposed research design based on routing protocols achieves the patient's sensitive data privacy preservation along with minimum computation efforts and energy consumption. The proposed model is Secure Communication-Elliptic Curve Cryptography (SCECC) WBAN-assisted networks in presence of attackers is evaluated using NS2. The proposed privacy preservation algorithm uses efficient cryptographic solutions using hash, digital signature, and the optimization of the network. © 2022 The Korean Society for Vascular Surgery.
物联网是工业4.0标准的一个子类,正在从服务质量(QoS)和安全的角度进行研究。由于新型冠状病毒等疫情,智能医疗监测越来越受到检测的兴趣。物联网中的数据从内部WBAN(无线身体区域网络)传输到内部WBAN,然后传输到WBAN之外。而将数据从一层传输到另一层的端到端数据隐私是需要关注的挑战。由于患者敏感数据的开放性和资源受限的传感器节点,很难保护其隐私。所提出的基于路由协议的研究设计实现了患者敏感数据隐私的保护,同时减少了计算工作量和能耗。所提出的模型是在存在攻击者的情况下使用NS2评估安全通信椭圆曲线密码(SCECC)WBAN辅助网络。所提出的隐私保护算法使用高效的加密解决方案,使用哈希、数字签名和网络优化。©2022韩国血管外科学会。
{"title":"Privacy-Preserving Mechanism to Secure IoT-Enabled Smart Healthcare System in the Wireless Body Area Network","authors":"Renuka S. Pawar, D. Kalbande","doi":"10.22247/ijcna/2022/217707","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217707","url":null,"abstract":"The IoT has been a subclass of Industry 4.0 standards that is under research from the perspective of quality of service (QoS) & security. Due to the pandemic situations like novel coronavirus smart healthcare monitoring gained growing interest in detection. In IoT data is communicated from Intra WBAN (Wireless Body Area Network) to inter-WBAN and then beyond WBAN. While transferring data from one layer to the other end-to-end data privacy is the challenge to focus on. The privacy-preserving of patients' sensitive data is difficult due to their open nature and resource-constrained sensor nodes. The proposed research design based on routing protocols achieves the patient's sensitive data privacy preservation along with minimum computation efforts and energy consumption. The proposed model is Secure Communication-Elliptic Curve Cryptography (SCECC) WBAN-assisted networks in presence of attackers is evaluated using NS2. The proposed privacy preservation algorithm uses efficient cryptographic solutions using hash, digital signature, and the optimization of the network. © 2022 The Korean Society for Vascular Surgery.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41566488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Aware Cross Layer Based Clustering and Congestion Control Using Mexican Axolotl Algorithm in VANET VANET中基于能量感知跨层聚类和墨西哥Axolotl算法的拥塞控制
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217703
Rashmi K H, Rekha Patil
– In recent years, wireless communication networks have been developing rapidly, which causes many challenges to be faced in vehicular ad hoc networks (VANETs). Congestion is a degradation of the quality of service in which messages begin to be delivered less often to the recipient. So, in this paper, to optimize the energy efficiency of network cross layer based clustering protocol is presented. For clustering, Reputation based Weighted Clustering Protocol (RBWCP) is presented. To enhance the clustering performance of RBWCP, clustering parameters of the protocol are optimally chosen using Mexican Axolotl Algorithm (MAA). In this work, cluster head is selected in every cluster using the weight vehicle’s reputation such as speed, direction and position. After the formation of cluster, mean value of vehicle density (MVVD) threshold is estimated depend on the received signal strength of the vehicles. This threshold value is compared with the density of each vehicle inside the cluster. If the density of the vehicle is greater than the threshold, then the cluster is divided into sub-clusters. It leads to control the congestion in the network. The execution of the proposed model is calculated in terms of cluster lifetime, delivery ratio, delay, overhead and throughput.
–近年来,无线通信网络发展迅速,这给车载自组织网络(VANET)带来了许多挑战。拥塞是服务质量的下降,消息开始不太频繁地传递给接收方。因此,本文提出了一种基于网络跨层聚类协议的能量效率优化方法。对于聚类,提出了基于信誉的加权聚类协议(RBWCP)。为了提高RBWCP的聚类性能,使用墨西哥Axolotl算法(MAA)对协议的聚类参数进行了优化选择。在这项工作中,使用重量车辆的声誉(如速度、方向和位置)在每个簇中选择簇头。集群形成后,根据车辆的接收信号强度估计车辆密度阈值的平均值。将该阈值与集群内每辆车的密度进行比较。如果车辆密度大于阈值,则将该集群划分为子集群。它可以控制网络中的拥塞。根据集群寿命、交付率、延迟、开销和吞吐量来计算所提出的模型的执行。
{"title":"Energy Aware Cross Layer Based Clustering and Congestion Control Using Mexican Axolotl Algorithm in VANET","authors":"Rashmi K H, Rekha Patil","doi":"10.22247/ijcna/2022/217703","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217703","url":null,"abstract":"– In recent years, wireless communication networks have been developing rapidly, which causes many challenges to be faced in vehicular ad hoc networks (VANETs). Congestion is a degradation of the quality of service in which messages begin to be delivered less often to the recipient. So, in this paper, to optimize the energy efficiency of network cross layer based clustering protocol is presented. For clustering, Reputation based Weighted Clustering Protocol (RBWCP) is presented. To enhance the clustering performance of RBWCP, clustering parameters of the protocol are optimally chosen using Mexican Axolotl Algorithm (MAA). In this work, cluster head is selected in every cluster using the weight vehicle’s reputation such as speed, direction and position. After the formation of cluster, mean value of vehicle density (MVVD) threshold is estimated depend on the received signal strength of the vehicles. This threshold value is compared with the density of each vehicle inside the cluster. If the density of the vehicle is greater than the threshold, then the cluster is divided into sub-clusters. It leads to control the congestion in the network. The execution of the proposed model is calculated in terms of cluster lifetime, delivery ratio, delay, overhead and throughput.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45147929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable and Robust Intrusion Detection System to Secure the IoT Environments using Software Defined Networks (SDN) Enabled Architecture 使用软件定义网络(SDN)启用架构保护物联网环境的可扩展和稳健的入侵检测系统
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217701
T. M. Alshammari, Faeiz Alserhani
– Due to the rapid development of smart devices with reduced costs and advanced sensing capabilities, the adoption of the internet of things has recently gained a lot of traction. However, such IoT devices are more vulnerable to being attacked or compromised. Moreover, traditional security mechanisms based on signatures and rules are no longer capable of detecting sophisticated intrusions. In the IoT context, the deployment of intelligent techniques in the control plane of the system architecture plays a vital role in identifying various attacks, including unknown ones. In this study, a software defined network (SDN)-based IoT anomaly intrusion detection system is proposed to detect abnormal behaviors and attacks. Five different machine learning techniques are investigated, including support vector machines, k-nearest neighbor, logistic regression, random forest, and decision trees. A scalable and robust intrusion detection system is designed based on machine learning models and placed at the SDN controller to observe and classify the behavior of IoT devices. A benchmark dataset, ToN-IoT, has been selected to test and evaluate the ML models by conducting several experiments. The obtained results have demonstrated that ML-based IDS can provide a reliable security system. Particularly, the random forest technique outperformed the other studied ML algorithms.
–由于具有降低成本和先进传感能力的智能设备的快速发展,物联网的采用最近获得了很大的吸引力。然而,此类物联网设备更容易受到攻击或破坏。此外,基于签名和规则的传统安全机制不再能够检测复杂的入侵。在物联网背景下,在系统架构的控制平面中部署智能技术在识别各种攻击(包括未知攻击)方面发挥着至关重要的作用。在本研究中,提出了一种基于软件定义网络(SDN)的物联网异常入侵检测系统来检测异常行为和攻击。研究了五种不同的机器学习技术,包括支持向量机、k近邻、逻辑回归、随机森林和决策树。基于机器学习模型设计了一个可扩展、鲁棒的入侵检测系统,并将其放置在SDN控制器上,以观察和分类物联网设备的行为。通过进行几个实验,选择了一个基准数据集ToN-IoT来测试和评估ML模型。研究结果表明,基于ML的入侵检测系统可以提供一个可靠的安全系统。特别地,随机森林技术优于其他研究的ML算法。
{"title":"Scalable and Robust Intrusion Detection System to Secure the IoT Environments using Software Defined Networks (SDN) Enabled Architecture","authors":"T. M. Alshammari, Faeiz Alserhani","doi":"10.22247/ijcna/2022/217701","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217701","url":null,"abstract":"– Due to the rapid development of smart devices with reduced costs and advanced sensing capabilities, the adoption of the internet of things has recently gained a lot of traction. However, such IoT devices are more vulnerable to being attacked or compromised. Moreover, traditional security mechanisms based on signatures and rules are no longer capable of detecting sophisticated intrusions. In the IoT context, the deployment of intelligent techniques in the control plane of the system architecture plays a vital role in identifying various attacks, including unknown ones. In this study, a software defined network (SDN)-based IoT anomaly intrusion detection system is proposed to detect abnormal behaviors and attacks. Five different machine learning techniques are investigated, including support vector machines, k-nearest neighbor, logistic regression, random forest, and decision trees. A scalable and robust intrusion detection system is designed based on machine learning models and placed at the SDN controller to observe and classify the behavior of IoT devices. A benchmark dataset, ToN-IoT, has been selected to test and evaluate the ML models by conducting several experiments. The obtained results have demonstrated that ML-based IDS can provide a reliable security system. Particularly, the random forest technique outperformed the other studied ML algorithms.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48010084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust Management Techniques and their Challenges in Cloud Computing: A Review 云计算中的信任管理技术及其挑战综述
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217708
Pooja Goyal, Sukhvinder Singh Deora
– Cloud computing is a way to handle tasks like development, production, and maintenance done on the web. This domain is evolving. It uses a pay-per-use system like an electric bill and can be used to run virtual machines. Customers are rapidly adopting and shifting the companies that provide such services due to the presence of numerous service providers. It is also customizable as per users’ requirements but poses several security risks. It is dynamic and can be updated to meet the needs of both the client and the service provider. It is a significant feature of such distributed computing platforms. However, this undermines trust and credibility and generates security, protection, individuality, and authenticity problems. Consequently, selecting an appropriate service provider is the most critical test in the cloud environment. The Trust system is an essential part of how QoS and feedback ratings are judged to evaluate the service. Even so, the executive's plan for observing and evaluating QoS still needs to get past several tests. This paper examines the current impediments to trust in the existing trust framework. This report includes a systematic review of various high-quality articles published on trust management between 2010 and July 2022. To do this, some strategies for managing trust are put into four groups: SLA, suggestion, feedback, and prediction. This article also compares the pros and cons, evaluation methods, tools, and simulation settings of different management models.
云计算是一种在网络上处理开发、生产和维护等任务的方法。这个领域正在发展。它使用按使用付费的系统,就像电费一样,可以用来运行虚拟机。由于众多服务提供商的存在,客户正在迅速采用和更换提供此类服务的公司。它也可以根据用户的需求进行定制,但会带来一些安全风险。它是动态的,可以更新以满足客户端和服务提供者的需求。这是这种分布式计算平台的一个重要特征。然而,这会破坏信任和信誉,并产生安全、保护、个性和真实性问题。因此,选择合适的服务提供商是云环境中最关键的测试。信任系统是判断服务质量和反馈评级以评估服务的重要组成部分。即便如此,这位高管观察和评估QoS的计划仍需要通过几次测试。本文考察了现有信任框架中存在的信任障碍。本报告包括对2010年至2022年7月期间发表的各种高质量信任管理文章的系统回顾。为此,将一些管理信任的策略分为四组:SLA、建议、反馈和预测。本文还比较了不同管理模型的优缺点、评估方法、工具和仿真设置。
{"title":"Trust Management Techniques and their Challenges in Cloud Computing: A Review","authors":"Pooja Goyal, Sukhvinder Singh Deora","doi":"10.22247/ijcna/2022/217708","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217708","url":null,"abstract":"– Cloud computing is a way to handle tasks like development, production, and maintenance done on the web. This domain is evolving. It uses a pay-per-use system like an electric bill and can be used to run virtual machines. Customers are rapidly adopting and shifting the companies that provide such services due to the presence of numerous service providers. It is also customizable as per users’ requirements but poses several security risks. It is dynamic and can be updated to meet the needs of both the client and the service provider. It is a significant feature of such distributed computing platforms. However, this undermines trust and credibility and generates security, protection, individuality, and authenticity problems. Consequently, selecting an appropriate service provider is the most critical test in the cloud environment. The Trust system is an essential part of how QoS and feedback ratings are judged to evaluate the service. Even so, the executive's plan for observing and evaluating QoS still needs to get past several tests. This paper examines the current impediments to trust in the existing trust framework. This report includes a systematic review of various high-quality articles published on trust management between 2010 and July 2022. To do this, some strategies for managing trust are put into four groups: SLA, suggestion, feedback, and prediction. This article also compares the pros and cons, evaluation methods, tools, and simulation settings of different management models.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45229081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Black and Grey Hole Attacks Using Hybrid Cat with PSO-Based Deep Learning Algorithm in MANET MANET中混合Cat与基于PSO的深度学习算法检测黑洞和灰洞攻击
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217705
S. Venkatasubramanian, A. Suhasini, S. Hariprasath
– The newest example of wireless networks, known as mobile ad hoc networks (MANETs), offers some qualities, including a topology that can change dynamically, a baseless network, a range of transmission, a routing procedure, and reliability. In a black hole attack on a computer network, packets are deleted as opposed to being forwarded through a router. This often happens when a router has been corrupted by several circumstances. A routing attack called a "black hole" has the power to bring down an entire network. One of the most common types of assaults on MANETs is the Grey Hole Attack, in which a hostile node allows routing but prevents data transmission. MANET security is a top priority because they are far more susceptible to assaults than wired infrastructure. This study focused on detecting black and grey-hole attacks in MANET by using deep learning techniques. The forwarding ratio metric is used in the individual attack detection phase to distinguish between the defective and normal nodes. The encounter records are manipulated by malicious nodes in the collusion attack detection phase for escaping the detection process. The attacks are detected by using different deep learning techniques like Convolutional Neural Network (CNN) and a Long Short-Term Memory (LSTM) network. The parameter tuning operation is carried out by using the Hybrid Cat-Particle Swarm Optimization (HCPSO). The simulation results shown in our proposed system detect with better accuracy.
–无线网络的最新例子,即移动自组织网络(MANET),提供了一些特性,包括可以动态变化的拓扑结构、无基础网络、传输范围、路由过程和可靠性。在对计算机网络的黑洞攻击中,数据包被删除,而不是通过路由器转发。当路由器因多种情况而损坏时,通常会发生这种情况。一种被称为“黑洞”的路由攻击有能力摧毁整个网络。对MANET最常见的攻击类型之一是灰洞攻击,其中敌对节点允许路由,但阻止数据传输。MANET安全是首要任务,因为它们比有线基础设施更容易受到攻击。本研究的重点是利用深度学习技术检测MANET中的黑洞和灰洞攻击。在单个攻击检测阶段使用转发比率度量来区分缺陷节点和正常节点。在共谋攻击检测阶段,恶意节点操纵相遇记录以逃避检测过程。攻击是通过使用不同的深度学习技术来检测的,如卷积神经网络(CNN)和长短期记忆(LSTM)网络。参数整定操作是通过使用混合Cat粒子群优化(HCPSO)来执行的。仿真结果表明,我们提出的系统检测精度较高。
{"title":"Detection of Black and Grey Hole Attacks Using Hybrid Cat with PSO-Based Deep Learning Algorithm in MANET","authors":"S. Venkatasubramanian, A. Suhasini, S. Hariprasath","doi":"10.22247/ijcna/2022/217705","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217705","url":null,"abstract":"– The newest example of wireless networks, known as mobile ad hoc networks (MANETs), offers some qualities, including a topology that can change dynamically, a baseless network, a range of transmission, a routing procedure, and reliability. In a black hole attack on a computer network, packets are deleted as opposed to being forwarded through a router. This often happens when a router has been corrupted by several circumstances. A routing attack called a \"black hole\" has the power to bring down an entire network. One of the most common types of assaults on MANETs is the Grey Hole Attack, in which a hostile node allows routing but prevents data transmission. MANET security is a top priority because they are far more susceptible to assaults than wired infrastructure. This study focused on detecting black and grey-hole attacks in MANET by using deep learning techniques. The forwarding ratio metric is used in the individual attack detection phase to distinguish between the defective and normal nodes. The encounter records are manipulated by malicious nodes in the collusion attack detection phase for escaping the detection process. The attacks are detected by using different deep learning techniques like Convolutional Neural Network (CNN) and a Long Short-Term Memory (LSTM) network. The parameter tuning operation is carried out by using the Hybrid Cat-Particle Swarm Optimization (HCPSO). The simulation results shown in our proposed system detect with better accuracy.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49581978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Clustering Algorithms and Proposed Architectural Framework for Border Surveillance System in Wireless Sensor Networks 基于无线传感器网络的边境监控系统聚类算法及体系结构研究
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217710
Jayachandran J, Vimala Devi K
– Border Surveillance system is a major security issue in all nations. In border surveillance systems, wireless sensor networks are one of the most important technologies which are going to play a vital role in future research. Researchers address the variety of challenges and spread the deployment in large areas in real time. In this paper, an overview of the border surveillance system their applied technologies, and the challenges faced during the deployment are discussed. An architectural framework for the border surveillance system is developed and presented. A comprehensive review is conducted with different routing protocols based on the node’s mobility, node’s localization, routing metrics, delay, throughput, energy efficiency, and their network lifetime. Simulation results of various protocols are conducted and presented. This work is intended to identify and focus on recent protocol developments and also opens research issues that need to be investigated in the future.
–边境监视系统是所有国家的主要安全问题。在边境监控系统中,无线传感器网络是最重要的技术之一,将在未来的研究中发挥至关重要的作用。研究人员应对各种挑战,并实时在大面积部署。本文概述了边境监控系统及其应用技术,并讨论了部署过程中面临的挑战。开发并提出了边境监控系统的体系结构框架。基于节点的移动性、节点的定位、路由度量、延迟、吞吐量、能效及其网络寿命,对不同的路由协议进行了全面的审查。给出了各种协议的仿真结果。这项工作旨在确定和关注最新的协议发展,并提出未来需要调查的研究问题。
{"title":"A Survey on Clustering Algorithms and Proposed Architectural Framework for Border Surveillance System in Wireless Sensor Networks","authors":"Jayachandran J, Vimala Devi K","doi":"10.22247/ijcna/2022/217710","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217710","url":null,"abstract":"– Border Surveillance system is a major security issue in all nations. In border surveillance systems, wireless sensor networks are one of the most important technologies which are going to play a vital role in future research. Researchers address the variety of challenges and spread the deployment in large areas in real time. In this paper, an overview of the border surveillance system their applied technologies, and the challenges faced during the deployment are discussed. An architectural framework for the border surveillance system is developed and presented. A comprehensive review is conducted with different routing protocols based on the node’s mobility, node’s localization, routing metrics, delay, throughput, energy efficiency, and their network lifetime. Simulation results of various protocols are conducted and presented. This work is intended to identify and focus on recent protocol developments and also opens research issues that need to be investigated in the future.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49168232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reliable and Scalable Broadcast Scheme for Safety Applications in Vehicular Ad Hoc Network 用于车载自组织网络安全应用的可靠且可扩展的广播方案
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217709
M. Vala, V. Vora
– In vehicular ad hoc networks (VANETs), safety-related applications require fast and reliable message broadcasting techniques for efficient performance. Reducing redundancy and increasing the reliability of message broadcasts are key challenges amid high mobility, rapidly changing topologies, and shorter communication ranges. The broadcasting protocol needs to be scalable for large variations in vehicle densities and road topologies. This paper presents a new broadcast protocol for safety applications in vehicular networks. The discussed scheme is adaptive to current network loads and channel conditions. Compared with other state-of-the-art protocols in its category, it offers better robustness, coverage, and scalability. It achieves these gains by selecting the next relay node adaptively and effectively suppressing redundant transmission of safety messages. Compared to existing work, the presented protocol offers performance improvements in terms of coverage and delay. It offers a 21% improvement in delay compared to the farthest distance-based protocol.
–在车载自组织网络(VANET)中,与安全相关的应用程序需要快速可靠的消息广播技术来实现高效性能。在高移动性、快速变化的拓扑结构和较短的通信范围中,减少冗余和提高消息广播的可靠性是关键挑战。广播协议需要可扩展,以适应车辆密度和道路拓扑结构的巨大变化。本文提出了一种新的用于车辆网络安全应用的广播协议。所讨论的方案对当前网络负载和信道条件是自适应的。与同类中其他最先进的协议相比,它提供了更好的健壮性、覆盖范围和可扩展性。它通过自适应地选择下一个中继节点并有效地抑制安全消息的冗余传输来实现这些增益。与现有工作相比,所提出的协议在覆盖范围和延迟方面提供了性能改进。与基于最远距离的协议相比,它在延迟方面提高了21%。
{"title":"Reliable and Scalable Broadcast Scheme for Safety Applications in Vehicular Ad Hoc Network","authors":"M. Vala, V. Vora","doi":"10.22247/ijcna/2022/217709","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217709","url":null,"abstract":"– In vehicular ad hoc networks (VANETs), safety-related applications require fast and reliable message broadcasting techniques for efficient performance. Reducing redundancy and increasing the reliability of message broadcasts are key challenges amid high mobility, rapidly changing topologies, and shorter communication ranges. The broadcasting protocol needs to be scalable for large variations in vehicle densities and road topologies. This paper presents a new broadcast protocol for safety applications in vehicular networks. The discussed scheme is adaptive to current network loads and channel conditions. Compared with other state-of-the-art protocols in its category, it offers better robustness, coverage, and scalability. It achieves these gains by selecting the next relay node adaptively and effectively suppressing redundant transmission of safety messages. Compared to existing work, the presented protocol offers performance improvements in terms of coverage and delay. It offers a 21% improvement in delay compared to the farthest distance-based protocol.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45025722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Competent Intelligence Modeling for Trust-Based Security Scheme in Mobile Ad Hoc Network 移动自组网中基于信任的安全方案的胜任智能建模
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217706
K. Vijay Anand, G. Abel Thangaraja
{"title":"A Competent Intelligence Modeling for Trust-Based Security Scheme in Mobile Ad Hoc Network","authors":"K. Vijay Anand, G. Abel Thangaraja","doi":"10.22247/ijcna/2022/217706","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217706","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43113289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computer Networks and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1