增强城域网中的物联网安全:新型自适应防御强化方法

IF 3.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Peer-To-Peer Networking and Applications Pub Date : 2024-05-03 DOI:10.1007/s12083-024-01702-1
S. Saravanan, V. Surya, V. Valarmathi, E. Nalina
{"title":"增强城域网中的物联网安全:新型自适应防御强化方法","authors":"S. Saravanan, V. Surya, V. Valarmathi, E. Nalina","doi":"10.1007/s12083-024-01702-1","DOIUrl":null,"url":null,"abstract":"<p>The requirement and the purpose of the IoT approach have developed substantially over the most recent few years. Here, IoT collects information from actual things, stores it, and then moves it to various organizations. Here, we use a Mobile Ad-Hoc Network (MANET) using IoT. MANET is highly delicate to malware which includes passive and active for the organization. Additionally, this paper shows the security angle-based IoT model utilizing AI. The black hole attack is one among these attacks which drops the entire information traffic and corrupts the organization's execution. In this way, it requires the designing of the novel Adaptive Defense Reinforcement Mountaineering Team Search (ADR-MTS) algorithm that distinguishes and safeguards the organization from the blackhole attack node. The role of ADR-MTS calculation recognizes the source directing and the sum of nodes that are been accomplished by the routing mechanism. This routing method assists with upgrading the course between the both objective node and the source node. The simulation analysis that performs MATLAB shows the improvement with regards to Packet Delivery Ratio (PDR). To improve the system efficiency a similar examination is performed against the current methodologies and from the study, the ADR-MTS calculation gives gainful outcomes concerning the location of black holes in the MANET-based IoT organizations The ADR-MTS method achieved a PDR of 98.7% and scalability of 98.5% and these results demonstrate the efficiency of the ADR-MTS method in comparison to existing methods.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"12 1","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing IoT security in MANETs: A novel adaptive defense reinforcement approach\",\"authors\":\"S. Saravanan, V. Surya, V. Valarmathi, E. Nalina\",\"doi\":\"10.1007/s12083-024-01702-1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The requirement and the purpose of the IoT approach have developed substantially over the most recent few years. Here, IoT collects information from actual things, stores it, and then moves it to various organizations. Here, we use a Mobile Ad-Hoc Network (MANET) using IoT. MANET is highly delicate to malware which includes passive and active for the organization. Additionally, this paper shows the security angle-based IoT model utilizing AI. The black hole attack is one among these attacks which drops the entire information traffic and corrupts the organization's execution. In this way, it requires the designing of the novel Adaptive Defense Reinforcement Mountaineering Team Search (ADR-MTS) algorithm that distinguishes and safeguards the organization from the blackhole attack node. The role of ADR-MTS calculation recognizes the source directing and the sum of nodes that are been accomplished by the routing mechanism. This routing method assists with upgrading the course between the both objective node and the source node. The simulation analysis that performs MATLAB shows the improvement with regards to Packet Delivery Ratio (PDR). To improve the system efficiency a similar examination is performed against the current methodologies and from the study, the ADR-MTS calculation gives gainful outcomes concerning the location of black holes in the MANET-based IoT organizations The ADR-MTS method achieved a PDR of 98.7% and scalability of 98.5% and these results demonstrate the efficiency of the ADR-MTS method in comparison to existing methods.</p>\",\"PeriodicalId\":49313,\"journal\":{\"name\":\"Peer-To-Peer Networking and Applications\",\"volume\":\"12 1\",\"pages\":\"\"},\"PeriodicalIF\":3.3000,\"publicationDate\":\"2024-05-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Peer-To-Peer Networking and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s12083-024-01702-1\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Peer-To-Peer Networking and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12083-024-01702-1","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

最近几年,物联网方法的要求和目的有了很大发展。在这里,物联网从实际事物中收集信息、存储信息,然后将信息传送到各个组织。在这里,我们使用物联网移动 Ad-Hoc 网络(MANET)。城域网非常容易受到恶意软件的攻击,其中包括组织的被动和主动恶意软件。此外,本文还利用人工智能展示了基于安全角度的物联网模型。黑洞攻击是这些攻击中的一种,它会中断整个信息流并破坏组织的执行。因此,需要设计新颖的自适应防御强化登山队搜索(ADR-MTS)算法,以区分和保护组织免受黑洞攻击节点的影响。ADR-MTS 计算的作用是识别由路由机制完成的源引导和节点总和。这种路由方法有助于提升目标节点和源节点之间的路线。执行 MATLAB 的仿真分析表明,数据包传输率(PDR)得到了改善。为了提高系统效率,针对当前方法进行了类似的检查,从研究结果来看,ADR-MTS 计算在基于 MANET 的物联网组织中的黑洞位置方面给出了有价值的结果。 ADR-MTS 方法的 PDR 达到 98.7%,可扩展性达到 98.5%,这些结果表明 ADR-MTS 方法与现有方法相比效率更高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

摘要图片

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Enhancing IoT security in MANETs: A novel adaptive defense reinforcement approach

The requirement and the purpose of the IoT approach have developed substantially over the most recent few years. Here, IoT collects information from actual things, stores it, and then moves it to various organizations. Here, we use a Mobile Ad-Hoc Network (MANET) using IoT. MANET is highly delicate to malware which includes passive and active for the organization. Additionally, this paper shows the security angle-based IoT model utilizing AI. The black hole attack is one among these attacks which drops the entire information traffic and corrupts the organization's execution. In this way, it requires the designing of the novel Adaptive Defense Reinforcement Mountaineering Team Search (ADR-MTS) algorithm that distinguishes and safeguards the organization from the blackhole attack node. The role of ADR-MTS calculation recognizes the source directing and the sum of nodes that are been accomplished by the routing mechanism. This routing method assists with upgrading the course between the both objective node and the source node. The simulation analysis that performs MATLAB shows the improvement with regards to Packet Delivery Ratio (PDR). To improve the system efficiency a similar examination is performed against the current methodologies and from the study, the ADR-MTS calculation gives gainful outcomes concerning the location of black holes in the MANET-based IoT organizations The ADR-MTS method achieved a PDR of 98.7% and scalability of 98.5% and these results demonstrate the efficiency of the ADR-MTS method in comparison to existing methods.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Peer-To-Peer Networking and Applications
Peer-To-Peer Networking and Applications COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
8.00
自引率
7.10%
发文量
145
审稿时长
12 months
期刊介绍: The aim of the Peer-to-Peer Networking and Applications journal is to disseminate state-of-the-art research and development results in this rapidly growing research area, to facilitate the deployment of P2P networking and applications, and to bring together the academic and industry communities, with the goal of fostering interaction to promote further research interests and activities, thus enabling new P2P applications and services. The journal not only addresses research topics related to networking and communications theory, but also considers the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security. The journal serves as a forum for tackling the technical problems arising from both file sharing and media streaming applications. It also includes state-of-the-art technologies in the P2P security domain. Peer-to-Peer Networking and Applications publishes regular papers, tutorials and review papers, case studies, and correspondence from the research, development, and standardization communities. Papers addressing system, application, and service issues are encouraged.
期刊最新文献
Are neck pain, disability, and deep neck flexor performance the same for the different types of temporomandibular disorders? Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach Towards real-time non-preemptive multicast scheduling in reconfigurable data center networks Homomorphic multi-party computation for Internet of Medical Things BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1