Back to Search Start Over

Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs.

Authors :
Alkanhel, Reem
El-kenawy, El-Sayed M.
Abdelhamid, Abdelaziz A.
Ibrahim, Abdelhameed
Abotaleb, Mostafa
Khafaga, Doaa Sami
Source :
Computers, Materials & Continua; 2023, Vol. 75 Issue 1, p1905-1921, 17p
Publication Year :
2023

Abstract

In terms of security and privacy, mobile ad-hoc network (MANET) continues to be in demand for additional debate and development. As more MANET applications become data-oriented, implementing a secure and reliable data transfer protocol becomes a major concern in the architecture. However, MANET's lack of infrastructure, unpredictable topology, and restricted resources, as well as the lack of a previously permitted trust relationship among connected nodes, contribute to the attack detection burden. A novel detection approach is presented in this paper to classify passive and active black-hole attacks. The proposed approach is based on the dipper throated optimization (DTO) algorithm, which presents a plausible path out of multiple paths for statistics transmission to boost MANETs' quality of service. A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron (DTO-MLP), and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical (LEACH) clustering technique. MLP is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor features. This hybridmethod is primarily designed to combat active black-hole assaults. Using the LEACH clustering phase, however, can also detect passive black-hole attacks. The effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested approach. For diverse mobility situations, the results demonstrate up to 97% detection accuracy and faster execution time. Furthermore, the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
15462218
Volume :
75
Issue :
1
Database :
Complementary Index
Journal :
Computers, Materials & Continua
Publication Type :
Academic Journal
Accession number :
161756285
Full Text :
https://doi.org/10.32604/cmc.2023.032157