FIGURE 3 - uploaded by Osamah Ibrahim Khalaf
Content may be subject to copyright.
Source publication
Security and correspondence happening between network central point will be an instance for principal issues in Mobile Ad-hoc Networks (MANETs). Due to some ideas created by the organization leading to avoid attacks but may end in failure due to inappropriate way and thus attacks need recognized and cleared. The Dual-Cooperative Bait Detection Sche...
Contexts in source publication
Context 1
... is done for detecting the malicious nodes and avoid in advance. An acknowledgment mechanism is done in such a way that, when an acknowledgment is received as a reply to source node, then only data packets are routed Figure 3. ...
Similar publications
Routing protocol isthe primary strategy to design any wireless network. In Mobile Ad Hoc Networks many routing protocols are present for sending packets from source to destination. Routing protocols in Mobile Ad Hoc Networks (MANETs) are reactive routing protocols, proactive routing protocols and hybrid routing protocols. Performance analysis of di...
Flying ad hoc networks (FANETs) composed of small unmanned aerial vehicles (UAVs) are flexible, inexpensive, and fast to deploy, which have been used in an increasing number of mission scenarios. However, unstable link quality and frequently changing network topology pose significant challenges for adopting existing routing protocols in mobile ad h...
In recent decades, expansion in urban areas has faced issues such as management of public waste, noise, mobility, and air quality, among others. In this scenario, Internet of Things (IoT) and Wireless Sensor Network (WSN) scenarios are being considered for Smart Cities solutions based on the deployment of wireless remote sensor nodes to monitor lar...
In wireless sensor networks (WSNs), the data must reach a processing node with less energy consumption and delay rate. However, with the specific consideration of the unique properties of sensor networks such as limited power, stringent bandwidth, dynamic topology due to node failures, adding/removing nodes, or even physical mobility, high network...
span>Flying Ad-hoc networks are emergent area in Ad-hoc networks evolved from MANETs and VANETs. Small unmanned aerial vehicles (UAVs) are used in FANETs applications and these small UAVs have limited resources while efficiently utilization of these resources is most critical task in real time monitoring of FANETs application. Network consumes its...
Citations
... The applications of WSNs have become increasingly widespread, including areas such as target tracking [8], [9], environmental monitoring, security, disaster response, and health monitoring [10], [11]. As such, there is a significant demand to resolve the hotspot issue caused by clustering in WSNs. ...
... Pheromones increase on the best paths and decrease on others through evaporation, ensuring efficient load balancing and path optimization. This pheromone update occurs in an ant cycle, where all ants complete their tours before updating the pheromone levels globally using (9). This approach helps ants make decisions about the allocation of resources, ultimately optimizing task scheduling and improving system efficiency. ...
Wireless sensor networks (WSNs) are crucial in various applications such as environmental surveillance, military operations, transportation monitoring, and healthcare. However, due to a finite set of sensor nodes' resources concerning energy, memory, disk, and CPU processing, nodes in WSNs often face hotspot issues. The sensor nodes that are located near the base station, are responsible for relaying data not only from themselves but also from neighboring nodes. This leads to hotspot issues, where nodes near the base station experience higher traffic loads and faster energy depletion. This paper mainly focuses on mitigating hotspot issues in heterogeneous WSNs using unequal clustering, load balancing, and an advanced ant colony algorithm. This approach involves devising strategies for selecting cluster heads, determining clusters optimal number and formation, and optimizing data transmission processes. Central to the methodology is utilizing load balancing mechanisms and an advanced ant colony algorithm to distribute the workload among sensor nodes more evenly and find the optimum routing path. The proposed algorithm shows promise in alleviating traffic congestion and energy depletion and provides an innovative approach to enhance network performance and prolong the lifespan of sensor nodes.
... Cooperative Bait Detection Scheme [78] Uses bait addresses to lure malicious nodes into revealing themselves and then prevents their participation in routing. ...
... The analysis showed that the proposed protocol managed to overcome the denial of service attacks and replay attacks. The security of the protocol was evaluated using Burrows-Abadi-Needham (BAN) logic and was said to attain better security and performance for e-Health Clouds (Kalime and Sagar 2020;Le et al. 2019;Khalaf et al. 2020). ...
... Work needs to be further improved to detect new nodes, resulting in a massive attack that is more distressing for MANET. Such networks have free or mobile nodes vulnerable to attacks, including black hole and gray hole attacks and selective packet drop attacks [14]. Content courtesy of Springer Nature, terms of use apply. ...
Mobile ad hoc networks (MANETs) are a class of wireless networks that can be operated without a fixed infrastructure. Due to the dynamics of decentralised systems, these networks are prone to different attacks like Black Hole Attack (BHA) and Gray Hole Attack (GHA). The basic requirement in this network is that all nodes are trusted nodes, but in a real-life scenario, some nodes may be malicious, so instead of transferring the data packet to the destination, it drops the data packet. Organisations have some ideas for preventing this attack but can fail due to improper methods, so the attack must be identified and addressed. This article uses the deep learning algorithm concept with a mutation-based artificial neural network (MBNN). It uses a swarm-based Cluster-Based Artificial Bee Colony (CBABC) optimisation technique to protect this network from BHA and GHA attacks. The proposed models performance has been improved by selecting the appropriate and best node for sending data packets. We have demonstrated experimental results suggesting that the proposed protocol outperforms existing work in the case of black and gray hole attacks.
... DL, often synonymous with deep learning, enables the automatic extraction of meaning from vast amounts of data without the need for domain expertise. An essential aspect of this process is feature extraction, a critical step in feature engineering that requires prior knowledge [54]. Effective classification necessitates proper feature extraction. ...
Past two decades, Wi-Fi innovation has developed so generally that most contemporary gadgets are compact and use Wi-Fi to access the web. Because no physical boundary separates a wireless network from a wired network, Wi-Fi network security is seriously questioned, and current security measures are helpless to an extensive variety of attacks. The objective of this research was to evaluate a novel approach called federated learning as a potential solution to address privacy concerns and high costs associated with data collection in the field of recognizing network attacks. The study introduces FEDDBN-IDS, a ground-breaking intrusion detection system (IDS) that utilizes deep belief networks (DBNs) within a federated deep learning (FDL) framework to detect and identify cyber threats specifically in Wi-Fi networks. A DBN with stacked restricted Boltzmann machines (RBM) was trained on each device to learn the low-dimensional features from unlabelled private and local data. A central server later combines these models into a global model (FL) using federated learning. Subsequently, the central server adds fully connected SoftMax layers to the overall model to create a supervised neural network and train the model using freely available labeled AWID datasets. The results obtained from our experiments on the AWID intrusion detection dataset indicate that our federated strategy achieves a high level of classification accuracy, ranging from 88% to 98%.
... In 2018, Jabbar et al. [22] proposed a hybrid routing mechanism with the utilization of "QoS-aware multipath energy routing protocol and routing protocol version 2" in link state with parameter optimization. This hybrid routing mechanism has provided better effectiveness regarding limited energy resources, traffic congestion, and mobility of nodes when forwarding data packets in MANET. ...
... However, it consumes more energy while data transmission. Multipath Energy and Quality of Service (QoS)-Aware Optimized Link State Routing Protocol version 2 (MEQSA-OLSRv2) [22] techniques effectively make routing decisions when assimilated over the existing model. It has minimized the energy cost per packet and controlled the overhead. ...
A self-organizing, reconfigurable, and structure-less wireless network that provides intended communications without any radio infrastructure is called the mobile ad hoc network (MANETs). It is generally utilized in special outside occasions, locations, military surgeries, and natural disasters. In MANET, providing security is the primary issue because of the adoption of network structures. Moreover, the modifications in dynamic topologies expose the strike selection, such as routing, eavesdropping, and alteration of several programs. If MANET has several privacy and security issues, then it may surpass the quality of services (QoS). Hence, the security in MANET is guaranteed by using intrusion tracking approaches. This intrusion tracking system regulates the MANET in recognizing some other violation weaknesses. High protections are provided by detecting intrusions from the entire network, which includes attacks that are beyond the network layer. The nodes are not merely altered by the power collapse in the system, but it is also capable of transferring the packets in the network, which depends on the total system life. An effective routing protocol is designed to select the optimal paths for enhancing navigation in MANETs. Moreover, the terms secure routing and energy efficiency are critical problems when changing the network topology and limiting resources with this kind of network. A hybridized optimization-aided routing strategy is offered in this research work to provide an energy-efficient routing protocol. At the initial stage, the experimentation is conducted based on the sensor nodes in MANET. Since the existing models are ineffective in achieving high energy efficiency, the new routing protocol is developed by proposing the hybrid optimization algorithm. Accordingly, the suggested work is regarded for optimizing the shortest path in the routing model by using the Hybrid Sailfish Optimizer and Whale Optimization Algorithm (HS-WOA). To validate the network efficacy, the fitness function is formulated using diverse constraints like “energy consumption, remaining battery energy, link cost, energy cost per packet, path loss, Packet Delivery Ratio (PDR), throughput, end-to-delay, and routing overhead ratio”. Finally, a performance of the classical techniques with the developed model proves the better energy efficiency achieved by the developed model in MANET.
... Attack success rate is less but effective method to remove smart attackers. Khalaf et al. (2020) the dual-cooperative bait detection scheme (D-CBDS) helps in detecting CBH/CGH attackers. Has proactive baiting, where one of the nodes will launch the baiting process to find the attackers. ...
... Attack success rate is less but effective method to remove smart attackers. Khalaf et al. (2020) the dual-cooperative bait detection scheme (D-CBDS) helps in detecting CBH/CGH attackers. Has proactive baiting, where one of the nodes will launch the baiting process to find the attackers. ...
... , [22], [23], [25][26][27][28], [31][32][33][34][35][36][37][38][39], [42][43][44][45][46][47], [49], [51], [55][56][57][58][59][60][61][62][63][64][65][66][67][68], [70] in the main text: ...
... The Packet Delivery Ratio (PDR) was used to show how many packets are successfully delivered in the network. Khalaf et al. (2020) proposed a method called DAPV for detecting malicious activity in mobile ad-hoc networks (MANETs). They utilized NDlog to identify any abnormal behavior in the network and used DAPV to illustrate the direction of the malicious activity by plotting a graph. ...
The MANET wireless network operates independently of any infrastructure and can establish connections dynamically, making it highly accessible regardless of the environment. However, the network is vulnerable to attacks such as the BHA, which can cause the depletion of the network. This attack introduces MNs into the network, providing false routing information to the source node. This leads to the drop of data packets and ultimately damages the network. To address this issue, we propose a node credibility-based approach that utilizes Andrew's plot to assess node credibility after several transactions. This method enables us to identify highly credible nodes which can be considered trustworthy in the network. We utilized Network Simulator software to create various MANET scenarios and test the effectiveness of our proposed approach against the BHA.