Nikitina Vlada, Raúl A. Sánchez-Ancajima, Miguel Ángel Torres Rubio, Walter Antonio Campos- Ugaz, Anibal Mejía Benavides, María Del Rocío Hende-Santolaya, Jacqueline C. Ponce-Meza
{"title":"增强移动自组织网络的安全性:增强粒子群优化驱动的入侵检测和安全路由算法","authors":"Nikitina Vlada, Raúl A. Sánchez-Ancajima, Miguel Ángel Torres Rubio, Walter Antonio Campos- Ugaz, Anibal Mejía Benavides, María Del Rocío Hende-Santolaya, Jacqueline C. Ponce-Meza","doi":"10.58346/jowua.2023.i3.006","DOIUrl":null,"url":null,"abstract":"Wireless technologies have grown in popularity and are used in many applications. Transient Mobile Ad hoc Networks (MANETs) serve specific goals without infrastructure. The dynamism of these networks makes them useful for ubiquitous computing. However, high mobility, the lack of a centralized authority, and open media make MANETs vulnerable to various security risks. Thus, an Intrusion Detection System (IDS) should be used to monitor and detect system security issues. To prevent and improve security against unauthorized access, intrusion screening is crucial. The depletion of a mobile node's power supply can impact its capacity to transmit packets, as this functionality is contingent upon the system's overall lifespan. Computational Optimization-driven solutions have been prevalent in the context of IDS and secure routing inside MANETs. This research employs the Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm (EPSO-IDSRA). Enhanced Particle Swarm Optimization technique (EPSO) has provided confidence-based, secure, and energy-efficient routing in MANETs. The EPSO technique is applied to identify optimal hops for enhancing the routing process. The initial step involves the activation of the fuzzy clustering algorithm, followed by selecting Cluster Heads (CHs) based on assessing their indirect, direct, and recent confidence values. Furthermore, the identification of value nodes was contingent upon assessing confidence levels. Also, the CHs are involved in multi-hop routing, and determining the optimal route depends on the anticipated protocol, which chooses the most favorable paths considering factors such as latency, throughput, and connectivity within the designated area. The EPSO method, presented for secure routing (at time 50ms), yielded an optimal energy consumption of 0.15 millijoules, a minimal delay of 0.008 milliseconds, a maximum throughput of 0.8 bits per second, and an 89% detection rate.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm\",\"authors\":\"Nikitina Vlada, Raúl A. Sánchez-Ancajima, Miguel Ángel Torres Rubio, Walter Antonio Campos- Ugaz, Anibal Mejía Benavides, María Del Rocío Hende-Santolaya, Jacqueline C. Ponce-Meza\",\"doi\":\"10.58346/jowua.2023.i3.006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless technologies have grown in popularity and are used in many applications. Transient Mobile Ad hoc Networks (MANETs) serve specific goals without infrastructure. The dynamism of these networks makes them useful for ubiquitous computing. However, high mobility, the lack of a centralized authority, and open media make MANETs vulnerable to various security risks. Thus, an Intrusion Detection System (IDS) should be used to monitor and detect system security issues. To prevent and improve security against unauthorized access, intrusion screening is crucial. The depletion of a mobile node's power supply can impact its capacity to transmit packets, as this functionality is contingent upon the system's overall lifespan. Computational Optimization-driven solutions have been prevalent in the context of IDS and secure routing inside MANETs. This research employs the Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm (EPSO-IDSRA). Enhanced Particle Swarm Optimization technique (EPSO) has provided confidence-based, secure, and energy-efficient routing in MANETs. The EPSO technique is applied to identify optimal hops for enhancing the routing process. The initial step involves the activation of the fuzzy clustering algorithm, followed by selecting Cluster Heads (CHs) based on assessing their indirect, direct, and recent confidence values. Furthermore, the identification of value nodes was contingent upon assessing confidence levels. Also, the CHs are involved in multi-hop routing, and determining the optimal route depends on the anticipated protocol, which chooses the most favorable paths considering factors such as latency, throughput, and connectivity within the designated area. The EPSO method, presented for secure routing (at time 50ms), yielded an optimal energy consumption of 0.15 millijoules, a minimal delay of 0.008 milliseconds, a maximum throughput of 0.8 bits per second, and an 89% detection rate.\",\"PeriodicalId\":38235,\"journal\":{\"name\":\"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58346/jowua.2023.i3.006\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58346/jowua.2023.i3.006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Computer Science","Score":null,"Total":0}
Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm
Wireless technologies have grown in popularity and are used in many applications. Transient Mobile Ad hoc Networks (MANETs) serve specific goals without infrastructure. The dynamism of these networks makes them useful for ubiquitous computing. However, high mobility, the lack of a centralized authority, and open media make MANETs vulnerable to various security risks. Thus, an Intrusion Detection System (IDS) should be used to monitor and detect system security issues. To prevent and improve security against unauthorized access, intrusion screening is crucial. The depletion of a mobile node's power supply can impact its capacity to transmit packets, as this functionality is contingent upon the system's overall lifespan. Computational Optimization-driven solutions have been prevalent in the context of IDS and secure routing inside MANETs. This research employs the Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm (EPSO-IDSRA). Enhanced Particle Swarm Optimization technique (EPSO) has provided confidence-based, secure, and energy-efficient routing in MANETs. The EPSO technique is applied to identify optimal hops for enhancing the routing process. The initial step involves the activation of the fuzzy clustering algorithm, followed by selecting Cluster Heads (CHs) based on assessing their indirect, direct, and recent confidence values. Furthermore, the identification of value nodes was contingent upon assessing confidence levels. Also, the CHs are involved in multi-hop routing, and determining the optimal route depends on the anticipated protocol, which chooses the most favorable paths considering factors such as latency, throughput, and connectivity within the designated area. The EPSO method, presented for secure routing (at time 50ms), yielded an optimal energy consumption of 0.15 millijoules, a minimal delay of 0.008 milliseconds, a maximum throughput of 0.8 bits per second, and an 89% detection rate.
期刊介绍:
JoWUA is an online peer-reviewed journal and aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to wireless mobile networks, ubiquitous computing, and their dependable applications. JoWUA consists of high-quality technical manuscripts on advances in the state-of-the-art of wireless mobile networks, ubiquitous computing, and their dependable applications; both theoretical approaches and practical approaches are encouraged to submit. All published articles in JoWUA are freely accessible in this website because it is an open access journal. JoWUA has four issues (March, June, September, December) per year with special issues covering specific research areas by guest editors.