Detecting Destructive Nodes with the Aim of Reducing Black Hole Attack Using Response Time Based on Machine Learning Model in Mobile Case Networks
محورهای موضوعی : پردازش چند رسانه ای، سیستمهای ارتباطی، سیستمهای هوشمند
Fatimah Jasim Mohammed
1
,
Azam Andalib
2
,
Hossein Azgomi
3
,
Seyed Ali Sharifi
4
1 - Department of electrical and computer engineering, Urmia University, Urmia, Iran
2 - Department of Computer Engineering, Ra.C., Islamic Azad University, Rasht, Iran
3 - Department of Computer Engineering, Ra.C., Islamic Azad University, Rasht, Iran
4 - Department of computer engineering, Bon.C., Islamic Azad University, Bonab, Iran
کلید واژه: شبکههای موردی سیار, مسیریابی, حمله سیاهچاله, گره مخرب, یادگیری عمیق و استنتاج فازی,
چکیده مقاله :
Mobile case networks, self-configurable, self-organized networks of mobile nodes that can move freely and independently in any direction without any restrictions, and use wireless links to communicate without relying on any specific, pre-designed infrastructure. These networks are widely used in applications such as military and disaster relief. However, due to their dynamism, lack of infrastructure, and lack of certificate authorization, they are vulnerable to a variety of attacks and security threats. One solution to provide security in these networks is to deploy intrusion detection systems (IDS). Black hole attacks are among the most common attacks in mobile case networks, which are discussed in this article in order to detect and isolate the black hole attack, a four-phase approach is proposed, in the first phase, clustering is done using the k-nearest neighbor algorithm (KNN), in the second phase, using the beta distribution, the confidence of each node and its remaining energy is calculated. Then, in the third phase, the cluster node is selected using fuzzy inference and finally, in the fourth phase, the response time is calculated based on the deep learning model. The simulation results show that the proposed approach provides better results with less routing overhead calculations and has improved parameters such as packet loss rate, operational throughput, packet delivery ratio, total network latency, and normal routing load compared to other methods.
Mobile case networks, self-configurable, self-organized networks of mobile nodes that can move freely and independently in any direction without any restrictions, and use wireless links to communicate without relying on any specific, pre-designed infrastructure. These networks are widely used in applications such as military and disaster relief. However, due to their dynamism, lack of infrastructure, and lack of certificate authorization, they are vulnerable to a variety of attacks and security threats. One solution to provide security in these networks is to deploy intrusion detection systems (IDS). Black hole attacks are among the most common attacks in mobile case networks, which are discussed in this article in order to detect and isolate the black hole attack, a four-phase approach is proposed, in the first phase, clustering is done using the k-nearest neighbor algorithm (KNN), in the second phase, using the beta distribution, the confidence of each node and its remaining energy is calculated. Then, in the third phase, the cluster node is selected using fuzzy inference and finally, in the fourth phase, the response time is calculated based on the deep learning model. The simulation results show that the proposed approach provides better results with less routing overhead calculations and has improved parameters such as packet loss rate, operational throughput, packet delivery ratio, total network latency, and normal routing load compared to other methods.
1. Sarbhukan, V.V., Ragha, L. Establishing secure routing path using trust to enhance security in MANET. Wireless Personal Communications, 110(6): 245-255, 2020.
2. Vinayagam, J., Balaswamy, Ch., Soundararajan, K. Certain investigation on MANET security with routing and blackhole attacks detection. Procedia Computer Science, 165:196-208, 2019.
3. Merlin, R.T., Ravi, R Novel trust_based energy aware routing mechanism for mitigation of black hole attacks in MANET. Wireless Personal Communications, 104: 1599-1636,2019.
4. Talukdar, M.I., Hassan, R., Hossen, M.S., Ahmad, K., Qamar, F., Ahmed, A.S. Performance improvements of AODV by black hole attack detection using IDS and digital signature. Wireless Communications and Mobile Computing, 2021.
5. Elmahdi, E., Yoo, S.M., Sharshembiev, K., Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. Journal of Information Security and Applications, 51: 102425, 2020.
6. Kowsigan, M., Rajeshkumar, J., Baranidharan, B., Prasath, N., Nalini, S., Venkatachalam, K. A novel intrusion detection system to alleviate the black hole attacks to improve the security and performance of the MANET. Wireless Personal Communications, pp. 1- 21,2021.
7. C. Sauer, E. Lyczkowski, M. Schmidt, A. Nüchter, and T. Hoßfeld, “Testing AGV mobility control method for MANET coverage optimization using procedural simulation,” Comput. Commun., vol. 194, no. June, pp. 189–201, 2022.
8. N. S. Saba Farheen and A. Jain, “Improved routing in MANET with optimized multi path routing fine-tuned with hybrid modeling,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 6, pp. 2443–2450, 2022.
9. S. Gurung and S. Chauhan, “A dynamic threshold_ based approach for mitigating black-hole attack in MANET,” Wireless Networks, vol. 24, no. 8, pp. 2957–2971, 2018.
10. M. Goswami, P. Sharma, and A. Bhargava, “Black hole attack detection in MANETs using trust_ based technique,” International Journal of Innovative Technology and Exploring Engineering, vol. 9, no. 4, pp. 1446–1451, 2020.
11. H. Moudni, M. Er-rouidi, H. Mouncif, and B. E. Hadadi, “Black hole attack detection using fuzzy based intrusion detection systems in MANET,” Procedia Computer Science, vol. 151, pp. 1176–1181, 2019.
12. G. Arulkumaran and R. K. Gnanamurthy, “Fuzzy trust approach for detecting black hole attack in mobile adhoc network,” Mobile Networks and Applications, vol. 24, no. 2, pp. 386–393, 2019.
13. A. U. Khan, G. Abbas, Z. H. Abbas, M. Waqas, and A. K. Hassan, “Spectrum utilization efficiency in the cognitive radio enabled 5G-based IoT,” Journal of Network and Computer Applications, vol. 164, no. 102686, pp. 1–16, 2020.
14. Arappali, N., Rajendran, G.B. MANET security routing protocols based on a machine learning technique. Journal of Ambient Intelligence and Humanized Computing, 12(16):6317-6331, 2021.
15. Cai, R.J., Li, X.J., Chong, P.H.J. An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Transactions on Mobile. Computing., 18(1): 42-55, 2019.
16. Dhanya, K., Jeyalakshmi, C., Balakumar, A. A secure autonomic mobile Ad-Hoc network based trusted routing proposal. International Conference on Computer Communication and Informatics (ICCCI), pp. 1-6, 2019.
17. N. C. Sattaru, M. R. Baker, D. Umrao, U. K. Pandey, M. Tiwari, and M. K. Chakravarthi, “Heart Attack Anxiety Disorder using Machine Learning and Artificial Neural Networks (ANN) Approaches,” 2022 2nd Int. Conf. Adv. Comput. Innov. Technol. Eng. ICACITE 2022, pp. 680–683, 2022.
18. M. R. A. Atia, M. Mokhtar, and J. Khalil, “An ANN parametric approach for the estimation of total production operation time,” Ain Shams Eng. J., vol. 13, no. 2, p. 101579, 2022.
19. S. R and A. H, “Adaptive fuzzy logic inspired path longevity factor-based forecasting model reliable routing in MANETs,” Sensors Int., vol. 3, no. August, p. 100201, 2022.
20. A. Bhatia, A. Kumar, A. Jain, A. Kumar, C. Verma, and Z. Illes, “Heliyon Networked control system with MANET communication and AODV routing,” Heliyon, vol. 8, no. August, p. e11678, 2022.
21. S. Ajith Arul Daniel, R. Pugazhenthi, R. Kumar, and S. Vijayananth, “Multi objective prediction and optimization of control parameters in the milling of aluminums hybrid metal matrix composites using ANN and Taguchi -grey relational analysis,” Def. Technol., vol. 15, no. 4, pp. 545–556, 2019.
22. الهام حاجیان، نوید اسدی، " تشخیص نفوذ با استفاده از یادگیری عمیق در شبکههای حسگر بیسیم بدنی"، مجلهی علمی پژوهشی سامانههای پردازشی و ارتباطی چند رسانهای هوشمند، دورهی 5، شمارهی 4، صفحهی 1-13.
23. محسن رکن الدینی، عرفانه نوروزی، " ارائه یک روش ترکیبی شبکههای عصبی عمیق جهت جلوگیری از نفوذ در شبکههای کامپیوتری"، مجلهی علمی پژوهشی سامانههای پردازشی و ارتباطی چند رسانهای هوشمند، دورهی 4، شمارهی 4، صفحهی 57-65.
