{"title":"针对城域网攻击的新型机器学习算法:黑洞和灰洞","authors":"Mukul Shukla, Brijendra Kumar Joshi, Upendra Singh","doi":"10.1007/s11277-024-11360-4","DOIUrl":null,"url":null,"abstract":"<p>Mobile ad hoc networks (MANETs) are a class of wireless networks that can be operated without a fixed infrastructure. Due to the dynamics of decentralised systems, these networks are prone to different attacks like Black Hole Attack (BHA) and Gray Hole Attack (GHA). The basic requirement in this network is that all nodes are trusted nodes, but in a real-life scenario, some nodes may be malicious, so instead of transferring the data packet to the destination, it drops the data packet. Organisations have some ideas for preventing this attack but can fail due to improper methods, so the attack must be identified and addressed. This article uses the deep learning algorithm concept with a mutation-based artificial neural network (MBNN). It uses a swarm-based Cluster-Based Artificial Bee Colony (CBABC) optimisation technique to protect this network from BHA and GHA attacks. The proposed models performance has been improved by selecting the appropriate and best node for sending data packets. We have demonstrated experimental results suggesting that the proposed protocol outperforms existing work in the case of black and gray hole attacks.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"13 1","pages":""},"PeriodicalIF":1.9000,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Novel Machine Learning Algorithm for MANET Attack: Black Hole and Gray Hole\",\"authors\":\"Mukul Shukla, Brijendra Kumar Joshi, Upendra Singh\",\"doi\":\"10.1007/s11277-024-11360-4\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Mobile ad hoc networks (MANETs) are a class of wireless networks that can be operated without a fixed infrastructure. Due to the dynamics of decentralised systems, these networks are prone to different attacks like Black Hole Attack (BHA) and Gray Hole Attack (GHA). The basic requirement in this network is that all nodes are trusted nodes, but in a real-life scenario, some nodes may be malicious, so instead of transferring the data packet to the destination, it drops the data packet. Organisations have some ideas for preventing this attack but can fail due to improper methods, so the attack must be identified and addressed. This article uses the deep learning algorithm concept with a mutation-based artificial neural network (MBNN). It uses a swarm-based Cluster-Based Artificial Bee Colony (CBABC) optimisation technique to protect this network from BHA and GHA attacks. The proposed models performance has been improved by selecting the appropriate and best node for sending data packets. We have demonstrated experimental results suggesting that the proposed protocol outperforms existing work in the case of black and gray hole attacks.</p>\",\"PeriodicalId\":23827,\"journal\":{\"name\":\"Wireless Personal Communications\",\"volume\":\"13 1\",\"pages\":\"\"},\"PeriodicalIF\":1.9000,\"publicationDate\":\"2024-08-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Wireless Personal Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11277-024-11360-4\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11360-4","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
A Novel Machine Learning Algorithm for MANET Attack: Black Hole and Gray Hole
Mobile ad hoc networks (MANETs) are a class of wireless networks that can be operated without a fixed infrastructure. Due to the dynamics of decentralised systems, these networks are prone to different attacks like Black Hole Attack (BHA) and Gray Hole Attack (GHA). The basic requirement in this network is that all nodes are trusted nodes, but in a real-life scenario, some nodes may be malicious, so instead of transferring the data packet to the destination, it drops the data packet. Organisations have some ideas for preventing this attack but can fail due to improper methods, so the attack must be identified and addressed. This article uses the deep learning algorithm concept with a mutation-based artificial neural network (MBNN). It uses a swarm-based Cluster-Based Artificial Bee Colony (CBABC) optimisation technique to protect this network from BHA and GHA attacks. The proposed models performance has been improved by selecting the appropriate and best node for sending data packets. We have demonstrated experimental results suggesting that the proposed protocol outperforms existing work in the case of black and gray hole attacks.
期刊介绍:
The Journal on Mobile Communication and Computing ...
Publishes tutorial, survey, and original research papers addressing mobile communications and computing;
Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia;
Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.;
98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again.
Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures.
In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment.
The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.