ArticlePDF Available

Machine Learning for Intrusion Detection in Ad-hoc Networks: Wormhole and Blackhole Attacks Case

Authors:
  • College of Technology- University of Buea

Abstract

This paper addresses the security concerns associated with Mobile Ad-hoc Networks (MANET) and proposes a new method for detecting and preventing attacks using machine learning. The study involved the creation of a MANET with 26 nodes in NetSim (Network Simulator) software, followed by the implementation of wormhole and blackhole attacks. A dataset was generated from the network traffic obtained during the simulations, and a machine-learning model was designed to predict and detect these attacks. The model achieved high sensitivity, accuracy and f1 scores of 99%. The effectiveness of the model was tested by developing a real-time application. This method can be applied to any wireless network and is particularly relevant for companies that use Ad-hoc networks for communication.
Cloud Computing and Data Science 62 | Aurelle Tchagna Kouanou, et al.
Cloud Computing and Data Science
http://ojs.wiserpub.com/index.php/CCDS/
Copyright ©2023 Aurelle Tchagna Kouanou, et al.
DOI: https://doi.org/10.37256/ccds.5120243516
This is an open-access article distributed under a CC BY license
(Creative Commons Attribution 4.0 International License)
https://creativecommons.org/licenses/by/4.0/
Research Article
Machine Learning for Intrusion Detection in Ad-hoc Networks:
Wormhole and Blackhole Attacks Case
Aurelle Tchagna Kouanou1,2 , Theophile Fozin Fonzin2,3, Franck Mani Zanga2, Adèle Ngo Mouelas2,4,
Gerad Nzebop Ndenoka5, Michael Sone Ekonde1
1Department of Computer Engineering, College of Technology, University of Buea, Cameroon
2Department of Training, Research, Development and Innovation, InchTech’s Solutions, Yaounde, Camer oon
3Department of Electrical and Electronic Engineering, Faculty of Engineering, University of Buea, Cameroon
4National Advanced School of Engineering Yaounde 1, Yaounde, Cameroon
5Department of Computer Science, University of Yaounde 1, Cameroon
Email: tkaurelle@gmail.com
Received: 10 August 2023; Revised: 20 September 2023; Accepted: 20 September 2023
Abstract: This paper addresses the security concerns associated with Mobile Ad-hoc Networks (MANET) and proposes
a new method for detecting and preventing attacks using machine learning. The study involved the creation of a MANET
with 26 nodes in NetSim (Network Simulator) software, followed by the implementation of wormhole and blackhole
attacks. A dataset was generated from the network trafc obtained during the simulations, and a machine-learning model
was designed to predict and detect these attacks. The model achieved high sensitivity, accuracy and f1 scores of 99%.
The effectiveness of the model was tested by developing a real-time application. This method can be applied to any
wireless network and is particularly relevant for companies that use Ad-hoc networks for communication.
Keywords: network security, Mobile Ad-hoc Networks (MANET), wormhole and blackhole, machine learning
1. Introduction
A Mobile Ad-hoc Network (MANET) is a dynamic wireless network that transmits information about neighboring
nodes through a temporary configuration [1-3]. MANET is also a set of mobile, self-organizing, and decentralized
nodes used in special cases such as military [3-5]. Each node in the MANET is equipped with a wireless receiver and
transmitter, allowing it to communicate with other nodes within the wireless transmission range [5-7]. Nowadays, the
use of MANETs is highly appealing and widespread in a lot of applications such as space communication, disaster
relief, mission-critical battlefield communication, road or accident guidance, trade fairs, sports stadiums, shopping
malls, and avoiding vehicle crashes [8]. However, MANET properties make the network’s environment vulnerable to
various types of attacks, including wormholes, black holes, Grey Holes, Rushing, and ood-based attacks [2-4, 9-11].
Many techniques and methods have been developed to deal with these attacks. For example, various intrusion detection
methods have been developed to detect common network attacks, focusing on other routing attacks such as black hole
attacks, Sybil attacks, identity replication attacks, selective forwarding attacks, wormhole attacks, and hello ood attacks
[12]. Prasad et al. investigated the detection method that can classify benign and malicious information in the MANET
Cloud Computing and Data Science
Volume 5 Issue 1|2024| 63
networks based only on routing attacks [13]. Ezhilarasi et al. Introduced in 2022, a new intrusion detection system that
uses fuzzy and feed-forward neural networks to detect only routing attacks in wireless sensor networks [12]. The two
previously cited papers work on routing attacks that include a set of attacks according to [12]. In this paper, our work is
based on Black Hole and Wormhole attacks because they are the major attacks in a MANET [14-16]. Many researchers
applied ML algorithms to develop a detection and prediction model for these two major attacks in MANET. It’s the case
of Prasad et al. who used ML along with Naïve Bayes and Stochastic Gradient Descent (SGD) for Wormhole detection
in an Ad hoc Network [17]. Shams et al. worked in Vehicular Ad Hoc Networks (a specialized type of MANET)
based on a Support Vector Machine (ML algorithm) to identify any signs of bad nodes that may be impacting system
performance [18]. However, to the best of our knowledge, many works using ML conducted on blackhole and wormhole
attacks in MANET have shown accuracy rates ranging from 59% to 98%, and any application developed for real-time
detection.
The main problem addressed in this paper is the lack of effective security mechanisms for Mobile Ad-hoc networks.
Works done in the literature to protect Mobile Ad-hoc networks from attacks such as blackhole and wormhole attacks are
not very accurate. Therefore, there is a need for new methods that can detect and prevent these attacks in real time with
good accuracy and precision. The objective of this paper is to address the security concerns associated with MANET
and propose an ML approach for detecting and preventing attacks.
In this paper, we designed an ML model to detect and predict Black Hole and Wormhole attacks in MANET. We
first simulated our network by using NetSim, secondly, we performed attacks and registered the log file simulation.
Thirdly, after pre-processing the dataset, we applied data analysis and ML to construct a Model. To get a good model,
we test various ML algorithms and, in the end, we choose Random Forest as our best model. The model is implemented
in an application that allows us to detect and predict blackhole and wormhole attacks in real time.
The rest of our work is designed as follow: Section 2 presents the state of the art where the different denition and
related work are given. The methodology of our work is presented in section 3. Here, the workow used algorithms, and
performance metrics are presented. The results and discussions with related work are given in section 4. This work ends
with a conclusion and future work in section 5.
2. Related works
MANET represents an independent system of porTable nodes to form a self-organizing, infrastructure-less, and
quickly deployable wireless network [8, 11, 19]. MANET is a promising technology that can provide important facilities
for up-to-date transportation systems [1]. Due to its inherent nature, MANET is strongly vulnerable to miscellaneous
security attacks [13, 17, 20]. Security attacks against MANET are divided into two categories according to their nature:
active attacks and passive attacks [13, 17, 20].
• Active attacks mainly target the condentiality and integrity of data. Active attacks involve modifying, dropping,
manufacturing, duplicating, or blocking the exchange of packets on the network. These attacks are usually launched from
authorized nodes on the network. They use various functions of the network to launch attacks.
• Passive attacks mainly target data condentiality. In a passive attack, malicious nodes attempt to compromise
the system based solely on monitoring transmissions on the channel, without directly harming the network. They extract
valuable information and use it for future attacks. These attacks are hard to spot because they don’t cause direct damage.
In addition, security attacks on MANET are also divided into two categories by domain: insider attacks and
outsider attacks [20-22].
• Outsider attacks are carried out by unauthorized external nodes to cause congestion, disrupt the normal operation
of the network, or spread incorrect routing information.
• Insider attacks are caused by internal compromised/malicious nodes to disrupt the normal operation of the
network.
In this work, we focused on Blackhole and wormhole attacks. Indeed, in a wormhole attack, an attacker inserts
fake nodes to broadcast data and transmit packets from one location on the network to another. On the other hand, an
attacker records packets from one place and tunnels them to another place in the MANET, where those packets are sent
back to the network. Black hole attack is one of the known security threats in wireless MANET. An intruder exploits
this vulnerability for malicious behavior because the process of route discovery is necessary and unavoidable. This
Cloud Computing and Data Science 64 | Aurelle Tchagna Kouanou, et al.
attack is known as a node dropping all packets it should forward, claiming it has the shortest path to the destination. Black
hole attack in MANET refers also to the attack of malicious nodes, which force the route from source to destination by
falsely advertising the shortest hops to reach the destination node [23].
In the literature, some authors worked to find an optimal solution for MANET attacks. Alhaidari and Alrehan
conducted an extensive literature review in 2021 and found many limitations in the datasets that can be used for DDoS
attacks on vehicular ad hoc networks [1]. However, they only focus their research on DDOS attacks. Hassan et al.
introduced an intelligent black hole attack detection scheme tailored to autonomous and connected vehicles [24]. But
their scheme wasn’t based on machine learning. Meddeb et al. in 2019 proposed just an approach to integrate an IDS
able to detect the majority and not all security attacks occur in MANET [25]. Their model wasn’t based on Machine
Learning and based only on behavioral databases. Another’s researchers like Shukla et al. based on cryptographic
methods to deal with wormhole and blackhole attacks [14]. Subba et al. in 2016 proposed an Intrusion Detection
Systems (IDS) scheme using a novel process for cluster leader election and based on an information Bayesian game for
Modeling the intrusion detection process [6]. Abdan and Seno in 2022 investigated on classication of wormhole attacks
in the MANET with several ML methods [26]. They reached an accuracy of 98.9% with Decision Trees (DT) higher
than other proposed ML models. However, they based on the unbalanced dataset to reach this result. Joon and Chopra
in 2021 based on deep learning (DL) and proposed a wireless network with a Hybrid DL Prediction (HDLP) model that
used Auto Encoding for Key Management and cluster-based network [27]. Table 1 presents a summary of the existing
solution.
Table 1. Summarize of existing research
Authors Approach Work done/Limitations ML-Based
Alhaidari and Alrehan [1]Extensive literature review on
network attacks Limited datasets for DDoS attacks on VANETs No
Hassan et al. [24]Intelligent black hole attack detection Not based on machine learning No
Meddeb et al. [25] IDS integration Detects majority, not all security attacks in MANET No
Shukla et al. [14] Cryptographic methods Deals with wormhole and blackhole attacks No
Subba et al. [6] IDS scheme using Bayesian game Novel process for cluster leader election No
Abdan and Seno [26]Classication of wormhole attacks Based on unbalanced dataset Yes (Decision Trees)
Joon and Chopra [27] Hybrid DL Prediction model Uses Auto Encoding for Key Management and
cluster-based network Yes (Deep Learning)
Based on the literature, no proposed work has designed a real-time application to detect and predict blackhole
and wormhole attacks in MANET. Also, the proposed ML models were not very accurate. Based on this drawback, we
design in this paper an optimal ML model that runs to a real-time application in MANET. The next section describes each
step of our proposed method.
3. Methodology
In this section, we give a detailed presentation of the different methods, techniques, and tools used to carry out the
work. We rst present our proposed pipeline. Afterward, we present the methods used to generate our dataset, preprocess
the dataset, perform exploratory data analysis (EDA), and, the ML used to build our prediction model. At the end of this
Cloud Computing and Data Science
Volume 5 Issue 1|2024| 65
section, we present the metric evaluation of the ML model and tools used to build our real time blackhole and wormhole
attack detection and prediction application. Figure 1a presents our proposed pipeline that contains steps involved in the
realization of our ML model. Figure 1b presents the pipeline to detect intrusion using machine learning.
Data Generation
(Simulation and Dataset
Generation with NetSim)
Modelling
(Training,Test;
Meries Evaluation
and Predittion)
Datal
Preprocessing
(Simulation and Dalaset
Gemeratien with NetSim)
EDA-Exploratory
of Data Analysis
(Data Visualiatisn,
Features Eatraction)
(a)
Monitoring
System
Data
preprocessing
Intrusion
Recognition
Intrusions
Modelling
Data collection
Alarm
Dataset Training
(b)
Figure 1. (a) Pipeline of our Proposed Solution (b) Pipeline of the machine learning technique used for intrusion detection
3.1 Data generation
In this subsection, we simulate our MANET and also simulate Blackhole and wormhole attacks in this network
and, save the log le as our dataset. To carry out our simulation, we based on NetSim software. Indeed, NetSim is a tool
that can be licensed for research, professional, or teaching use [28]. NetSim provides native parsing support, a packet
animation, a user-friendly tool to support miscellaneous activities and allows both emulation and simulation [28-30].
So, build a network with 26 nodes and conFigure the routing protocol on AODV (Ad-Hoc On-Demand Vector) between
them. Blackhole and Wormhole processes have been installed as applications. Figure 2 presents the Initial position radio
Cloud Computing and Data Science 66 | Aurelle Tchagna Kouanou, et al.
characteristics of each node.
0.0, 0.0 420.0, 0.0 840.0, 0.0
840.0, 0.0
0.0, 300.0
0.0, 600.0
Figure 2. Initial position radio characteristics of each node
If the congurations are ended for all the nodes, we can now perform general properties conguration. Afterwards,
we create the simulation network by specifying the simulation time and tick the record animation and then launch the
simulation. Figure 3b shows the initial position of each node and their radio characteristics. At the end of the simulation,
we can export all the features as a csv le. Table 2 presents the form of our csv le. Our data set contains 21 columns. In
Table 2 we present just the head of 15 columns.
Cloud Computing and Data Science
Volume 5 Issue 1|2024| 67
Table 2. Head of the generated dataset
duration protocol psize ag dsn msn si land mode neighbor low avghopcount nfc frate label
0 AODV 84 0 0 0 0 0 0 1 101 0.078049 206 100 normal
0.028136 AODV 84 0 0 1 0 0 0 1 101 0.078049 206 100 normal
0.972864 AODV 84 0 0 0 1 0 0 1 101 0.078049 206 100 normal
0.028136 AODV 84 0 0 1 1 0 0 1 101 0.078049 206 100 normal
0.967864 AODV 84 0 0 0 2 0 0 1 101 0.078049 206 100 normal
0.024136 AODV 84 0 0 1 2 0 0 1 101 0.078049 206 100 normal
0.978864 AODV 84 0 0 0 3 0 0 1 101 0.078049 206 100 normal
0.028136 AODV 84 0 0 1 3 0 0 1 101 0.078049 206 100 normal
0.971864 AODV 84 0 0 0 4 0 0 1 101 0.078049 206 100 normal
0.026136 AODV 84 0 0 1 4 0 0 1 101 0.078049 206 100 normal
0.975864 AODV 84 0 0 0 5 0 0 1 101 0.078049 206 100 normal
0.018136 AODV 84 0 0 1 5 0 0 1 101 0.078049 206 100 normal
3.2 Data pre-processing
The aim here is to clean, encode, impute, and standardize our dataset. These steps are classic and simple to deal
with.
Cleaning: It consists of deleting variables that have at least 90% of missing values. Our new data set has the
dimension (13,480.21 for the blackhole data set and 37,862.21 for the wormhole dataset) and contains respectively 40%
attack cases and 60% normal cases for one, and 60% attack cases and 40% normal cases for the other.
Encoding: Here the target and other discrete features are to associate each qualitative value to a numerical value.
Imputation: It consists of deleting or replacing missing values with other values in order to facilitate future
operations. In this paper, we replaced the missing values by the mean of elements because of 7% of missed values.
Standardization: It consists of putting all the variables (features and target) under the same scale by making
them follow the same law of probability.
3.3 Exploratory of Data Analysis (EDA)
Our analysis is based on the generated dataset. The dataset contains respectively 13,480 and 37,862 entries for
blackhole and wormhole network activities. The features of this dataset are obtained after simulations in the AdHoc
Network using NetSim software. In total, we have 21 features and the target is represented by the variable Label, which
contains attack in case of malignant activity and normal in case of benign activity.
In Table 3, duration indicates the transferring time of the packet from source to destination, ag shows the status
of packets and hopcount shows the intermediate nodes. The Size of packets is dened in a packet size that includes
Cloud Computing and Data Science 68 | Aurelle Tchagna Kouanou, et al.
header length in themselves. Messages are divided into many categories which are mainly Route Request, Route Reply,
Route Acknowledgment, etc. A Neighbor node is a number of nodes surrounding the node in the communication range.
When the sender and originator of the message are the same, then land is indicated by Zero Otherwise One. Unicast
and broadcast are two different types of message-transferring modes. Message sequence number, originator sequence
number, and stream index are generated sender or receiver for uniquely identied packets. The ow of the message
through the nodes can dene the highest ow, lowest ow, and average ow. The Number of failed connections and
failure rate can be computed using the Route Error message [17].
Table 3. Features names and type
No Feature name Type No Feature name Type
1 Duration Continuous 12 Land Discrete
2 Protocol Discrete 13 Message sequence number Continuous
3 Packet size Continuous 14 Stream index Continuous
4 Flag Discrete 15 Highest ow Continuous
5 Header length Continuous 16 Average ow Continuous
6 Hop count Continuous 17 Lowest ow Continuous
7 Life time Continuous 18 Average hop count Continuous
8 Message type Discrete 19 Number of failed
connections Continuous
9Destination sequence
number Continuous 20 Failed connection rate Continuous
10 Message transfer mode Discrete 21 Label Discrete
11 Number of neighbors Continuous
0
5
15
25
10
20
30
duration
Density
-0.2 0.0 0.4 0.80.2 0.6 1.0 1.2
0.0000
0.0005
0.0015
0.0025
0.0010
0.0020
0.0030
ag
Density
0 2500 75005000 10000 12500 15000 17500
Cloud Computing and Data Science
Volume 5 Issue 1|2024| 69
0.00
0.01
0.03
0.05
0.02
0.04
dsn
Density
0 200 600400 800 1000
0
1
3
5
2
4
hopcount
Density
0 4 82 6
Figure 3. Data Distribution of features Duration, Flag, HCPcount, DSN
0.00
0.05
0.15
0.10
0.20
duration
protacol
psize
ag
hlength
hopcount
lifetime
message type
dsn
msn
si
land
mode
neighbor
how
aow
Iow
avghopcount
nfc
frate
0
Figure 4. Features Importance with ANOVA F-test
ML needs features that follow the probabilistic normal law [31]; so, we have plotted the feature distribution in
order to ensure that all features follow a normal distribution. Figure 3 presents us with some feature distribution of our
dataset.
Our dataset contains 20 features plus the target. We used the ANOVA with F-test to see the importance of each
feature. Indeed, Analysis of variance (ANOVA) is a statistical technique used to test whether the means of two or
Cloud Computing and Data Science 70 | Aurelle Tchagna Kouanou, et al.
more groups are signicantly different [32]. ANOVA tests the effect of one or more factors by comparing the means of
different samples. ANOVA tests the equality of means using the F-test statistic [31-32]. Based on [31], we can see how
to evaluate the feature importance by using ANOVA with the F test. Figure 4 shows us the most important features in
our dataset. In this Figure, the value is not different so far because the variation range is between 0.00 to 0.25 which is
negligible. ANOVA test tells us that we will use all our features.
3.4 Modelling
In this part, we discuss the ML algorithms used to develop our model. We start with ve ML algorithms and next,
we choose the best one that gives good metrics to our dataset. In this part, 80% of the dataset is used as training data, and,
20% constitutes the test set or data for evaluation or validation. The evaluation criteria used here are accuracy, precision,
and recall given in the eq. (1), eq. (2), and eq. (3) [31, 33-35].
1
0
1
( ) 1( ),
samples
n
pred pred i
sampl i
es
accuracy y y y y
n
=
= =
(1)
_
__
True Positive
recall True Positive False Negative
=+
∑∑
(2)
(3)
_
__
True Negative
specificity True Negative False Positive
=+
∑∑
With: nsamples: The number of samples; ypred : The predicted value of the i-th sample; yi : The corresponding true
value. True_Positive result indicates a correct identication of a threat, while a True_Negative result indicates a correct
determination that no threat exists. A False_Positive result is an incorrect identication of a threat, and a False_Negative
result is a failure to identify a threat.
In this paper, we implement Random Forests (RF). Indeed, we implement five ML algorithms (Support Vector
Machine, Logistic Regression, K-Nearest Neighbors, Random Forests and Decision Trees). But, our best algorithm
among them is RF.
RF classier is an ensemble method that trains multiple decision trees in parallel with bootstrapping and subsequent
aggregation, collectively known as bagging [36-38]. RF merges the decisions of multiple decision trees in order to nd
an answer, which represents the average of all these decision trees (predictions from all trees are pooled to make the nal
prediction) [38]. We based on the Gini index to perform RF on the classication dataset. Its formula is given by the eqs. (4)
and (5) [39].
(4)
( )
2
1
C
i
GiniIndex P=
(5)
( ) ( )
22
1PP
+−

=−+


Eq. (5) uses the class and probability to determine the Gini of each branch on a node, determining which of the
branches is more likely to occur. Here, Pi represents the relative frequency of the class you are observing in the dataset,
C represents the number of classes, P+ represents the probability of a positive class and P represents the probability of a
negative class [39].
Eq. (6) shows us that we can also use entropy to determine how nodes branch in a decision tree [37-39].
Cloud Computing and Data Science
Volume 5 Issue 1|2024| 71
(6)
2
1
*log ( )
C
i
i
i
Entropy p p
=
=
Entropy uses the probability of a given outcome to decide how a node should branch. Unlike the Gini index, it
is more mathematically intensive due to the use of a logarithmic function in the calculation [37-39]. In this paper, we
implement the RF Model with the eqs. (5) and (6).
4. Results and discussions
In this section, we present the obtained results in a simple and realistic way. Interpretation of the results is
discussed to put them in context and, explain why they are important.
4.1 Results
As explained in the methodology section, we train our model by using ve algorithms. Table 4 presents us with
the evaluation metric of all ve algorithms. In Table 4, we can easily see why we chose Random Forest to build our
proposed application.
Table 4. comparative results of our ves used algorithms
Model True Negative False Negative False Positive True Positive Precision
Logistic Regression 2106 552 5 23 0.80
Support Vector Machine 1991 401 120 174 0.71
K-Nearest-Neighbors 1781 456 22 427 0.75
Decision Tree 2111 3 0 572 0.98
Random Forest 2107 1 4 574 0.99
The learning curves of the different algorithm on the model are presented on Figure 5.
Figure 5 permits us to notice that the Decision Tree (DT) and Random Forest (RF) are almost the same. These
results can be explained because an RF is a set of many DTs. Also, an RF is more stage than a decision tree. To
ensure that we are not faced with overtting, we apply the cross-validation method to our RF model. By applying the
GridSearchCV method, we obtained the same learning curves presented in Figure 5a. The RF model is used to develop
our application. We based on Flask and developed our application namely APP-IPS. To launch our application, we need
to start the Flask service by running in prompt command the following commands:
• set FLASK_APP = main.py
• set FLASK_DEBUG = 1
• Flask run
When the service is run, we need to copy and paste the displayed address to the navigator. After logging successfully,
we have the main page that gives us the eventuality to train or re-train the model before the prediction and, the
prevention. Figure 6 presents the interfaces for these operations.
Cloud Computing and Data Science 72 | Aurelle Tchagna Kouanou, et al.
(d)
1000 2000 40003000 5000 6000 7000 8000
0.965
0.970
0.980
0.995
0.975
0.985
0.990
1.000
train score
validation score
(c)
1000 2000 40003000 5000 6000 7000 8000
0.825
0.850
0.900
0.975
0.875
0.925
0.950
1.000
train score
validation score
(e)
1000 2000 40003000 5000 6000 7000 8000
0.815
0.820
0.830
0.825
0.835
0.840 train score
validation score
(a)
1000 2000 40003000 5000 6000 7000 8000
0.965
0.970
0.980
0.995
0.975
0.985
0.990
1.000
train score
validation score
(b)
1000 2000 40003000 5000 6000 7000 8000
0.77
0.79
0.78
0.80
train score
validation score
Figure 5. Learning curves of each algorithm, (a): Random Forest, (b): Logistic Regression, (c): Support Vector Machine, (d): Decision Tree, (e):
K-Nearest Neighbor
Cloud Computing and Data Science
Volume 5 Issue 1|2024| 73
(a)
(b)
(c)
Figure 6. APP-IPS (a): Main page, (b): Overview of dataset, (c): Training and Testing done, (d): Classication
In Figure 6, we can see that, after selecting the dataset (Figure 6a), we can previsualization the dataset before
moving to the train and test part (Figure 6b). when the train and test were done, we received a notication (Figure 6c).
We can use the model to perform the classication of data (Figure 6d). The system takes all the values in the elds of
any packet that transits and, creates an instance of the prediction function which prints either attack in case of attack or
Cloud Computing and Data Science 74 | Aurelle Tchagna Kouanou, et al.
normal in case of normal activity (Figure 7).
(a)
(b)
Figure 7. Classication and IPS action to anomaly detection. (a): Classifying before IPS action, (b): IPS reaction
Figure 7b presents the reaction of the application background. We can notice that the attack has been blocked and
blacklisted. Figure 8 presents an example of capturing on a server.
Figure 8. Capturing packets from our proposed application (APP-IPS)
4.2 Discussions
In this paper, we proposed a method based on ML to detect and predict Blackhole and wormhole attacks to a
Cloud Computing and Data Science
Volume 5 Issue 1|2024| 75
MANET. We rst design our MANET network in NETSIM software using 26 nodes. We did an attack in this network
and generated a dataset. This dataset has been used to build our ML model. We constructed an application that allowed
us to predict and block blackhole and wormhole attacks on our network. Although the good performance of our results,
we need to compare them to see the effectiveness of our proposed method. However, we perform only subjective
comparisons because we haven’t used the same database as those in the literature. Indeed, most of the projects done in
this domain have been performed by using KDD or IRIS datasets. It’s the case of Prasad et al. in [17] that based on
their generated dataset got after simulation, and, obtained a precision of their proposed model of 80%. Also, Sebopelo
et al., based on the IRIS dataset in MANET obtained a model accuracy equal to 100% [40]. It’s important to notice that
Sebopelo et al., only detect malicious nodes in MANET and cannot identify the type of attack. Sebopelo et al. performed
binary classication. They classied packet data in MANET as either abnormal or normal and, for that reason, they can
reach a high precision and accuracy. Gad et al. worked on a variant of MANET, VANET, and based on the KDD dataset
with a multiclass classication, they reached an accuracy of 98.3% and a precision of 98.3% using XGboost as the best
ML algorithm [41]. Meddeb et al. in [42] and [43] worked also in MANET and performed multiclass classification
on their own generated dataset and obtained encouraging results. However, other authors proposed security by using
blockchain and encryption methods in communication networks [44-46]. Table 3 summarizes and compares our results
with those in the literature. Figure 9 represents the graphical version of Table 3 for a good comparison. Based on Table
5, and, to the best of our knowledge, no literature work did not propose a real-time application to detect an attack in the
MANET network. This is a good advantage of our proposed paper.
Table 5. Comparison Table of proposed work based on Data based, algorithms, Precision and accuracy
Authors Data Base ML Algorithms Precision (%) Accuracy (%)
Prasad et al. [17] Their Generated dataset Naive Bayes (NB) 94 93.06
Sebopelo et al. [40] IRIS Logistic Regression (LR) 100 100
Gad et al. [41] KDD XGBoost 98.3 98.3
Meddeb et al. [42] Their Generated dataset Fuzzy-KNN - 94
Meddeb et al. [43] Their Generated dataset SVM - 96.2
US Our Generated Dataset RF 99.8 99.8
In terms of future works, there is a need to implement real-time intrusion detection systems for MANETs using
ML algorithms in a local company. This requires developing a pipeline of our solution and describing all dependencies.
Furthermore, researchers should focus on developing methods that can detect all the attacks and sophisticated attacks,
such as those that use advanced evasion techniques. This requires that we will need very large data and use deep learning
instead of machine learning for a robust model.
Cloud Computing and Data Science 76 | Aurelle Tchagna Kouanou, et al.
Sebopelo et al.
[40]
Meddeb et al.
[43]
Gad et al.
[41]
Prasad et al.
[17]
Meddeb et al.
[42]
US
Accuracy (%) Precision (%)
80
85
95
90
100
105
Figure 9. Comparison graph of proposed work based on Precision and accuracy
5. Conclusion
Decentralized wireless networks are one of the options of the future in terms of cost (without infrastructure) and
connectivity. In contrast to these advantages, these networks are subject to vulnerability to various attacks. This paper
proposed a method for modeling blackhole and wormhole attacks using machine learning methods in MANET. We
described different attacks in MANET and, based on the literature, chose to work on the two famous attacks blackhole
and Wormhole. After modeling of this MANET and the conguration of all the nodes, we launched attacks and recorded
data. The obtained dataset is used. We tested ve ML algorithms and chose RF as our best one. RF gave us 99.8% of
precision and accuracy and, is used to construct our application to detect and predict Blackhole and wormhole attacks
in MANET. The proposed method introduced in this paper can be applied to any wireless network, but it is particularly
relevant for companies that use Ad-hoc networks for communication. This paper focuses on two types of attacks (blackhole
and wormhole), which may not cover all possible attacks that can occur in MANETs. This can be a limitation of the
paper. As the number of data continues to grow in communication networks, we propose in the future to use Deep
Learning along with autoencoder to develop a robust model for our real-time application in MANET.
Acknowledgements including declarations
Acknowledgements: The authors would like to acknowledge and thank InchTech’s team (www.inchtechs.com) for
their support and assistance during the conception of that work.
Funding and competing interests: We wish to conrm that there are no known conicts of interest associated with
this publication and there has been no signicant nancial support for this work that could have inuenced its outcome.
Ethical approval: This article does not contain any studies with human participants and/or animals performed by
any of the authors.
Cloud Computing and Data Science
Volume 5 Issue 1|2024| 77
Conict of interest
The authors declare no competing nancial interest.
References
[1] Alhaidari FA, Alrehan AM. A simulation work for generating a novel dataset to detect distributed denial of service
attacks on Vehicular Ad hoc Network systems. International Journal of Distributed Sensor Networks. 2021; 17(3):
1-25. Available from: https://doi.org/10.1177/15501477211000287.
[2] Aluvala S, Sekhar R, Vodnala D. An empirical study of routing attacks in mobile Ad-hoc networks. Procedia
Computer Science. 2016; 92: 554-561. Available from: https://doi.org/10.1016/j.procs.2016.07.382.
[3] Tseng FH, Chou LD, Chao HC. A survey of black hole attacks in wireless mobile ad hoc networks. Human-Centric
Computing and Information Sciences. 2011; 1(1): 4.
[4] Abdelhaq M, Alsaqour R, Abdelhaq S. Securing mobile ad hoc networks using danger theory-based artificial
immune algorithm. PLoS ONE. 2015; 10(5): e0120715. Available from: https://doi.org/10.1371/journal.
pone.0120715.
[5] Anusha K, Sathiyamoorthy E. A new trust-based mechanism for detecting intrusions in MANET. Information
Security Journal: A Global Perspective. 2017; 26(4): 153-165. Available from: https://doi.org/10.1080/19393555.2
017.1328544.
[6] Subba B, Biswas S, Karmakar S. Intrusion detection in mobile Ad-hoc networks: Bayesian game formulation.
Engineering Science and Technology, an International Journal. 2016; 19: 782-799.
[7] Amiri E, Keshavarz H, Heidari H, Mohamadi, E, Moradzadeh H. Intrusion detectionsystems in MANET: A
review. Procedia-Social and Behavioral Sciences. 2014; 129: 453-459. Available from: https://doi.org/10.1016/
j.sbspro.2014.03.700.
[8] Thanuja R, Umamakeswari A. Unethical network attack detection and prevention using fuzzy based decision
system in mobile Ad-hoc networks. Journal of Electrical Engineering and Technology. 2018; 13(5): 2086-2098.
Available from: https://doi.org/10.5370/JEET.2018.13.5.2086.
[9] Alheeti KMA, Gruebler A, McDonald-Maier K. Intelligent intrusion detection of grey hole and rushing
attacks in self-driving vehicular networks. Computers. 2016; 5(3): 16. Available from: https://doi.org/10.3390/
computers5030016.
[10] Popli R, Sethi M, Kansal I, Garg A, Goyal N. Machine learning based security solutions in MANETs: State of
the art approaches. Journal of Physics: Conference Series. 2021; 1950: 012070. Available from: https://doi.
org/10.1088/1742-6596/1950/1/012070.
[11] Imran M, Khan FA, Jamal T, Durad MH. Analysis of detection features for wormhole attacks in MANETs.
Procedia Computer Science. 2015; 56: 384-390. Available from: https://doi.org/10.1016/j.procs.2015.07.224.
[12] Ezhilarasi M, Gnanaprasanambikai L, Kousalya A, Shanmugapriya M. A novel implementation of routing attack
detection scheme by using fuzzy and feed-forward neural networks. Soft Computing. 2022; 27: 4157-4168.
Available from: https://doi.org/10.1007/s00500-022-06915-1.
[13] Prasad M, Tripathi S, Dahal K. An enhanced detection system against routing attacks in mobile Ad-hoc network.
Wireless Networks. 2022; 28: 1411-1428. Available from: https://doi.org/10.1007/s11276-022-02913-1.
[14] Shukla M, Joshi K, Singh U. Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in
MANET. Wireless Personal Communications. 2021; 121: 503-526. Available from: https://doi.org/10.1007/s11277-
021-08647-1.
[15] Malik TS, Siddiqui MN, Mateen M, Malik KR, Sun S, Wen J. Comparison of blackhole and wormhole attacks in
cloud MANET enabled IoT for agricultural eld monitoring. Security and Communication Networks. 2022; 2022:
4943218. Available from: https://doi.org/10.1155/2022/4943218.
[16] Siddiqui MN, Malik KR, Malik TS. Performance analysis of blackhole and wormhole attack in MANET based
IoT. 2021 International Conference on Digital Futures and Transformative Technologies (ICoDT2). Islamabad,
Pakistan: IEEE; 2021. p.1-8. Available from: https://doi.org/10.1109/ICoDT252288.2021.9441515.
[17] Prasad M, Tripathi S, Dahal K. Wormhole attack detection in ad hoc network using machine learning technique.
2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
Kanpur, India: IEEE; 2019. p.1-7. Available from: https://doi.org/10.1109/ICCCNT45670.2019.8944634.
[18] Shams EA, Rizaner A, Ulusoy AH. Trust aware support vector machine intrusion detection and prevention system
Cloud Computing and Data Science 78 | Aurelle Tchagna Kouanou, et al.
in vehicular ad hoc networks. Computers & Security. 2018; 78: 245-254. Available from: https://doi.org/10.1016/
j.cose.2018.06.008.
[19] Alghamdi SA. Novel trust-aware intrusion detection and prevention system for 5G MANET-Cloud. International
Journal of Information Security. 2022; 21: 469-488. Available from: https://doi.org/10.1007/s10207-020-00531-6.
[20] Kumar S, Dutta K. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges.
Security and Communication Networks. 2016; 9(14): 2484-2556. Available from: https://doi.org/10.1002/sec.1484.
[21] Khraisat A, Alazab A. A critical review of intrusion detection systems in the internet of things: Techniques,
deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity. 2021; 4(1): 18.
Available from: https://doi.org/10.1186/s42400-021-00077-7.
[22] Sivanesh S, Dhulipala S. Accurate and Cognitive Intrusion Detection System (ACIDS): A novel black hole
detection mechanism in mobile ad hoc networks. Mobile Networks and Applications. 2021; 26: 1696-1704.
Available from: https://doi.org/10.1007/s11036-019-01505-2.
[23] Mohanapriya M, Krishnamurthi I. Modied DSR protocol for detection and removal of selective black hole attack
in MANET. Computers and Electrical Engineering. 2014; 40: 530-538. Available from: https://dx.doi.org/10.1016/
j.compeleceng.2013.06.001.
[24] Hassan Z, Mehmood A, Maple C, Khan MA, Aldegheishem A. Intelligent detection of black hole attacks for secure
communication in autonomous and connected vehicles. IEEE Access. 2020; 8: 199618-199628. Available from:
https://doi.org/0.1109/ACCESS.2020.3034327.
[25] Meddeb R, Jemili F, Triki B, Korbaa O. Anomaly-based behavioral detection in mobile Ad-hoc networks. Procedia
Computer Science. 2019; 159: 77-86. Available from: https://doi.org/10.1016/j.procs.2019.09.162.
[26] Abdan M, Seno SAH. Machine learning methods for intrusive detection of wormhole attack in Mobile Ad-hoc
Network (MANET). Wireless Communications and Mobile Computing. 2022; 2022: 2375702. Available from:
https://doi.org/10.1155/2022/2375702.
[27] Joon D, Chopra K. Hybrid deep learning prediction model for blackhole attack protection in wireless
communication. Natural Volatile and Essential Oils. 2021; 8(4): 10228-10243.
[28] Campanile L, Gribaudo M, Iacono M, Marulli F, Mastroianni M. Computer network simulation with ns-
3: A systematic literature review. Electronics. 2020; 9(2): 272. Available from: https://doi.org/10.3390/
electronics9020272.
[29] Patel KN, Jhaveri RH. A survey on emulation testbeds for mobile Ad-hoc networks. Procedia Computer Science.
2015; 45: 581-591. Available from: https://doi.org/10.1016/j.procs.2015.03.111.
[30] Dorathy I, Chandrasekaran M. Simulation tools for mobile ad hoc networks: A survey. Journal of Applied Research
and Technology. 2018; 16(5): 437-445. Available from: https://doi.org/10.22201/icat.16656423.2018.16.5.739.
[31] Kouanou AT, Attia TM, Djeumo AF, Mouelas AN, Nzogang MP, Tchapga CT, et al. An overview of data analysis
and machine learning for Covid-19 detection. Journal of Healthcare Engineering. 2021; 2021: 4733167. Available
from: https://doi.org/10.1155/2021/4733167.
[32] Cleophas TJ, Zwinderman AH. Analysis of Variance (Anova). Regression Analysis in Medical Research. Springer,
Cham; 2021. Available from: https://doi.org/10.1007/978-3-030-61394-5_7.
[33] Tchapga CT, Mih TA, Kouanou AT, Fonzin TF, Fogang PK, Mezatio BA, et al. Biomedical image classication in a
big data architecture using machine learning algorithms. Journal of Healthcare Engineering. 2021; 2021: 9998819.
Available from: https://doi.org/10.1155/2021/9998819.
[34] Kouanou AT, Tchiotsop D, Kengne R, Zephirin DT, Armele NMA, Tchinda R. An optimal big data workflow
for biomedical image analysis. Informatics in Medicine Unlocked. 2018; 11: 68-74. Available from: https://doi.
org/10.1016/j.imu.2018.05.001.
[35] Alla Takam C, Samba O, Tchagna Kouanou A, Tchiotsop D. Spark architecture for deep learning-based dose
optimization in medical imaging. Informatics in Medicine Unlocked. 2020; 29: 1-13. Available from: https://doi.
org/10.1016/j.imu.2020.100335.
[36] Misra S, Li H. Noninvasive fracture characterization based on the classification of sonic wave travel times.
Machine Learning for Subsurface Characterization. 2020; 243-287. Available from: https://doi.org/10.1016/B978-
0-12-817736-5.00009-0.
[37] Best K, Gilligan J, Baroud H, Carrico A, Donato K, Mallick B. Applying machine learning to social datasets: A
study of migration in southwestern Bangladesh using random forests. Regional Environmental Change. 2022; 22:
52. Available from: https://doi.org/10.1007/s10113-022-01915-1.
[38] Wang S, Aggarwal C, Liu H. Random-forest-inspired neural networks. ACM Transactions on Intelligent Systems
and Technology. 2018; 9(6): a69. Available from: https://doi.org/10.1145/3232230.
[39] Algehyne EA, Jibril ML, Algehainy NA, Alamri OA, Alzahrani AK. Fuzzy neural network expert system with
Cloud Computing and Data Science
Volume 5 Issue 1|2024| 79
an improved gini index random forest-based feature importance measure algorithm for early diagnosis of breast
cancer in saudi arabia. Big Data and Cognitive Computing. 2022; 6: 13. Available from: https://doi.org/10.3390/
bdcc6010013.
[40] Sebopelo R, Isong B, Gasela N. Identification of compromised nodes in MANETs using machine learning
technique. International Journal of Computer Network and Information Security. 2019; 1: 1-10. Available from:
https://doi.org/10.5815/ijcnis.2019.01.01.
[41] Gad A, Nashat A, Barkat T. Intrusion detection system using machine learning for vehicular ad hoc networks
based on ToN-IoT dataset. IEEE Access. 2021; 9: 142206-142217. Available from: https://doi.org/10.1109/
ACCESS.2021.3120626.
[42] Meddeb R, Triki B, Jemili F, Korbaa O. Dataset for intrusion detection in mobile Ad-hoc networks. In: Abraham
A, Siarry P, Ma K, Kaklauskas A. (eds.) Intelligent Systems Design and Applications. ISDA 2019. Advances in
Intelligent Systems and Computing, vol 1181. Springer, Cham; 2021. Available from: https://doi.org/10.1007/978-
3-030-49342-4_3.
[43] Meddeb R, Jemili F, Triki B, Korbaa O. Anomaly-based behavioral detection in mobile Ad-hoc network. Procedia
Computer Science. 2019; 159: 77-86. Available from: https://doi.org/10.1016/j.procs.2019.09.162.
[44] Ploder C, Spiess T, Bernsteiner R, Dilger T, Weichelt R. A risk analysis on blockchain technology usage for
electronic health records. Cloud Computing and Data Science. 2021; 2(2): 1-16. Available from: https://doi.
org/10.37256/ccds.222021777.
[45] Khasim S, Basha SS. An improved fast and secure CAMEL based authenticated key in smart health care system.
Cloud Computing and Data Science. 2022; 3(2): 77-91. Available from: https://doi.org/10.37256/ccds.3220221423.
[46] Tchagna Kouanou A, Tchapga CT, Sone Ekonde M, Monthe V, Mezatio BA, Manga J, et al. Securing data in an
internet of things network using blockchain technology: Smart home case. SN Computer Science. 2022; 3: 167.
Available from: https://doi.org/10.1007/s42979-022-01065-5.
... MANETs are a type of mobile network that relies on infrastructure and technology. In MANETs, the nodes act as adapters, lowering the network's cost [1] [3]. The revolutionary change of MANETs is one of the reasons for their incredible speed in different environmental circumstances. ...
... A.T. Kouanou and his coworkers [1] This article presents a new way for identifying and preventing attack on MANETs, employing machine learning. For the experiment, a 26-node MANET was built using the software NetSim (Network Simulator). ...
... The On Demand AODV protocol was selected for the route path selection because of the protocol characteristics. Initially, 50 nodes were initiated in the 500*500 meter simulation network area, and the nodes count increased by 50 every 5 ns to reach the 200 nodes maximum; each node's mobility is random, and speed was 0 to 25ms, and the simulation study time was 200 sec, packet transmission of each nodes 10,15,20,25,30,35,40 packets to get the simulation graph values. ...
... End-to-end delay was computed from the delivery packet time difference between the packet sent and the packet received. Initially, the packet sent is set from 10, and slowly increasing by 15,20,25,30,35, and 40, the defined to one node to delay in the packet and another node to drop the packet to compute the End to End delay. ...
... Kouanou et al. [22] created secure communication, which can avoid wormhole and black hole attacks in any wireless communication network. This strategy employs recent machine learning techniques to create a prototype for attacker avoidance. ...
Article
Full-text available
This paper proposes a Blockchain-based Intrusion Detection System (IDS) for Secure Mobile Ad-Hoc Networks (MANET) to overcome limitations in existing intrusion detection techniques. The scheme starts with noise elimination through data preprocessing using the Mantis Search Algorithm (MSA) for feature selection. A lightweight consensus algorithm is introduced for blockchain-based trust management in MANETs, ensuring tamper-proof distributed trust framework for node routing. Integration of blockchain with the Optimized Link State Routing Protocol (OLSR) addresses security concerns effectively. Each node independently executes security operations within the proposed framework, fostering cooperation to combat network adversaries. Gated Recurrent Units (GRU) are employed for classification, with hyperparameter optimization using Giant Armadillo Optimization (GAO). Comparative analysis demonstrates the enhanced GRU model's superiority in intrusion detection, achieving 99.6% sensitivity, 99.4% specificity, 99.4% F-measure, and 99.5% accuracy. Additionally, the proposed GRU model enhances packet delivery ratio, throughput, and reduces routing overhead in MANET.
Conference Paper
Full-text available
Cellular ad Hoc Networks (MANETs) have become increasingly popular in cell computing packages, inclusive of cellular computing, fitness care, automobile, and army packages. As such, safety protocols used in the transmission of records over MANETs are of essential importance for their hit usage. In this paper, we endorse an evaluation of safety protocols for cloud computing algorithms in MANETs. We first discuss the main safety necessities that have to be satisfied. At the same time, a cloud set of rules is adopted in a MANET and then provides a survey of different security protocols that can be used to relax the cloud algorithms for MANETs. We are aware of precise cloud algorithms for MANETs: Opportunistic Routing and Cooperative Caching. We look at the safety of these cloud algorithms under three one-of-a-kind security protocols-SSL/TLS, IPSec, and 2FA-and examine the effect of these protection protocols on their execution. Finally, we summarize our findings and offer guidelines for the adoption of security protocols in MANETs for cloud-based total computing algorithms.
Article
Full-text available
In recent years, the advancements in wireless technologies and sensor networks have promoted the Mobile Internet of Things (MIoT) paradigm. However, the unique characteristics of MIoT networks expose them to significant security vulnerabilities and threats, necessitating robust cybersecurity measures, including effective attack detection and mitigation techniques. Among these strategies, Artificial Intelligence (AI), and particularly Machine Learning‐ (ML) based approaches, emerge as a pivotal method for bolstering MIoT security. In this paper, we present a comprehensive literature survey regarding the utilization of ML for enhancing security in MIoT. Through an exhaustive review of existing research articles, we analyze the diverse array of ML‐based approaches employed to safeguard MIoT ecosystems and provide a holistic understanding of the current landscape, elucidating the strengths and limitations of prevailing methodologies. We propose a structured taxonomy to categorize recent works in this domain, by distinguishing approaches based on Shallow Supervised Learning (SSL), Shallow Unsupervised Learning (SUL), Deep Learning (DL), and Reinforcement Learning (RL). By delineating existing challenges and potential future directions for cybersecurity in MIoT, we aim to stimulate discourse and inspire novel approaches towards more resilient and secure MIoT ecosystems.
Article
The Internet of Things (IoT) is revolutionizing diverse sectors like business, healthcare, and the military, but its widespread adoption has also led to significant security challenges. IoT networks, in particular, face increasing vulnerabilities due to the rapid proliferation of connected devices within smart infrastructures. Wireless sensor networks (WSNs) comprise software, gateways, and small sensors that wirelessly transmit and receive data. WSNs consist of two types of nodes: generic nodes with sensing capabilities and gateway nodes that manage data routing. These sensor nodes operate under constraints of limited battery power, storage capacity, and processing capabilities, exposing them to various threats, including wormhole attacks. This study focuses on detecting wormhole attacks by analyzing the connectivity details of network nodes. Machine learning (ML) techniques are proposed as effective solutions to address these modern challenges in wormhole attack detection within sensor networks. The base station employs two ML models, a support vector machine (SVM) and a deep neural network (DNN), to classify traffic data and identify malicious nodes in the network. The effectiveness of these algorithms is validated using traffic generated by the NS3.37 simulator and tested against real-world scenarios. Evaluation metrics such as average recall, false positive rates, latency, end-to-end delay, response time, throughput, energy consumption, and CPU utilization are used to assess the performance of the proposed models. Results indicate that the proposed model outperforms existing methods in terms of efficacy and efficiency.
Article
Full-text available
In Mobile Ad hoc Network (MANET) enabled Internet of Things (IoT) agricultural field monitoring, sensor devices are automatically connected and form an independent network that serves as a cloud for many services such as monitoring, securing, and properly maintaining. Cloud-based services in MANET models can prove to be an extremely effective way of smart agricultural functionalities for device-to-device information exchange. Security is a serious issue with Cloud-MANET-based IoT since nodes are scattered, mobile, and lacking centralized administrator, which makes it possible for data tampering and illegal actions on cloud servers. Therefore, these types of networks are more vulnerable to Denial of Service (DoS) attacks such as Blackhole and Wormhole. The MANET Enabled IoT-Agricultural Field Monitoring environment is deployed through a case study. The effect of Blackhole and Wormhole attacks is analyzed using the Ad hoc On-demand Distance Vector (AODV) routing protocol with the help of Network Simulator 3 (NS-3) in order to determine which has the most impact on network performance. We computed performance constraints such as throughput, packet delivery ratio (PDR), end-to-end delay (EED), and Jitter-Sum of preprocessed data gathered with the flow-monitor module of NS-3. The effect of attacks on MANET Enabled IoT-Agricultural Field Monitoring is compared on the varying number of nodes participating in the Cloud-MANET-based IoT network. The throughput and goodput capability of every node is computed through the trace metric package. This method is also highly useful for future Cloud-MANET-Based IoT smart agricultural field security research.
Article
Full-text available
As researchers collect large amounts of data in the social sciences through household surveys, challenges may arise in how best to analyze such datasets, especially where motivating theories are unclear or conflicting. New analytical methods may be necessary to extract information from these datasets. Machine learning techniques are promising methods for identifying patterns in large datasets, but have not yet been widely used to identify important variables in social surveys with many questions. To demonstrate the potential of machine learning to analyze large social datasets, we apply machine learning techniques to the study of migration in Bangladesh. The complexity of migration decisions makes them suitable for analysis with machine learning techniques, which enable pattern identification in large datasets with many covariates. In this paper, we apply random forest methods to analyzing a large survey which captures approximately 2000 variables from approximately 1700 households in southwestern Bangladesh. Our analysis ranked the covariates in the dataset in terms of their predictive power for migration decisions. The results identified the most important covariates, but there exists a tradeoff between predictive ability and interpretability. To address this tradeoff, random forests and other machine learning algorithms may be especially useful in combination with more traditional regression methods. To develop insights into how the important variables identified by the random forest algorithm impact migration, we performed a survival analysis of household time to first migration. With this combined analysis, we found that variables related to wealth and household composition are important predictors of migration. Such multi-methods approaches may help to shed light on factors contributing to migration and non-migration.
Article
Full-text available
The application of wireless sensor networks is not limited to a particular domain. Technology advancements result in innovative solutions for simple communication to large applications via wireless sensor IoT networks. Besides the advancements, there is a serious issue in terms of threats or attacks on wireless sensor networks, which is common. Various intrusion detection methodologies have evolved so far to detect common network attacks. But it is essential to concentrate on other routing attacks like selective forwarding attack, black hole attack, Sybil attack, wormhole attack, identity replication attack, and hello flood attack. Existing research models concentrate on any one of the above-mentioned routing attacks and attain better detection performance. Detecting each attack through different detection mechanisms will increase the overall cost, and it is a tedious process. Considering this factor, in this research work, a novel intrusion detection system is introduced to detect routing attacks in wireless sensor networks using fuzzy and feed-forward neural networks. The experimental results demonstrate that the proposed model attains an average detection rate of 97.8% and a maximum detection accuracy of 98.8%, compared to existing techniques like support vector machine (SVM), decision tree (DT), and random forest (RF) models.
Article
Full-text available
Every day, innovative technologies emerge (5G networks, quantum computing) or change to existing technologies (big data, deep learning, blockchain, etc.). These technologies are expected to play an essential role on the Internet of Things (IoT) systems and applications. The IoT architecture generates substantial amounts of diverse types of data at extremely high speeds. All these generated data need to be secure. Scalable and secure data sharing is essential for all technological domains. Taking into consideration of blockchain technology today in data security, we can also think about a method to secure IoT data based on blockchain. In this paper, we proposed a blockchain method to secure data in an IoT architecture. We used EOS Blockchain for its scalability, flexibility and native enhanced throughput. Architecture in a concept of a smart home using blockchain is proposed. We combine Arduino, Raspberry Pi and sensors to create an IoT ecosystem for a smart home. Data are collected and stored in EOS blockchain for better security and integrity. We use Raspberry Pi as a client to get data in our developed blockchain. The real implementation is performed and the obtained results show us that we can send more than 500 data per second in our EOS blockchain. We discuss our results and saw that our blockchain method outperformed those in related works in terms of the number of data stored per millisecond in blockchain and the scalability. The proposed EOS blockchain pipeline for securing Smart Home data is provided at the end of this paper.
Article
Full-text available
Mobile ad-hoc network is a dynamic wireless network that transfers information through neighbor nodes with a temporary configuration. Due to its dynamic nature, it is exposed to attacks and intrusions. Routing disruption attack is the main problem of this network where intermediate nodes act maliciously. An encryption-based security mechanism is a first-line defense system that is efficient. It is still not compatible with the mobile ad-hoc network environment. Malicious nodes can drop encrypted data packets in this network. The lightweight technique analyzes a few parameters that consume few resources and provide comparatively low detection rates. However, an intrusion detection system is a reliable second-line security mechanism. In this paper, we have proposed a detection method that classifies malicious and benign information. The proposed intrusion detection method is based on learning techniques that initially require a dataset to determine mobile nodes’ behavior. Subsequently, we perform this work in an order such as mobile ad-hoc network simulation with some malicious nodes, features selection, and data collection using packet captured files. This work is executed through extensive simulations in the NS-3. The proposed method learns the system for information classification, and experimental results that show the proposed method performs better than existing schemes. Moreover, the obtained performance confirms that the suggested feature set is suitable for the intrusion detection system in mobile ad-hoc networks.
Article
Full-text available
A wormhole attack is a type of attack on the network layer that reflects routing protocols. The classification is performed with several methods of machine learning consisting of K-nearest neighbor (KNN), support vector machine (SVM), decision tree (DT), linear discrimination analysis (LDA), naive Bayes (NB), and convolutional neural network (CNN). Moreover, we used nodes’ properties for feature extraction, especially nodes’ speed, in the MANET. We have collected 3997 distinct (normal 3781 and malicious 216) samples that comprise normal and malicious nodes. The classification results show that the accuracy of the KNN, SVM, DT, LDA, NB, and CNN methods are 97.1%, 98.2%, 98.9%, 95.2%, 94.7%, and 96.4%, respectively. Based on our findings, the DT method’s accuracy is 98.9% and higher than other ways. In the next priority, SVM, KNN, CNN, LDA, and NB indicate high accuracy, respectively.
Article
Full-text available
Breast cancer is one of the common malignancies among females in Saudi Arabia and has also been ranked as the one most prevalent and the number two killer disease in the country. However, the clinical diagnosis process of any disease such as breast cancer, coronary artery diseases, diabetes, COVID-19, among others, is often associated with uncertainty due to the complexity and fuzziness of the process. In this work, a fuzzy neural network expert system with an improved gini index random forest-based feature importance measure algorithm for early diagnosis of breast cancer in Saudi Arabia was proposed to address the uncertainty and ambiguity associated with the diagnosis of breast cancer and also the heavier burden on the overlay of the network nodes of the fuzzy neural network system that often happens due to insignificant features that are used to predict or diagnose the disease. An Improved Gini Index Random Forest-Based Feature Importance Measure Algorithm was used to select the five fittest features of the diagnostic wisconsin breast cancer database out of the 32 features of the dataset. The logistic regression, support vector machine, k-nearest neighbor, random forest, and gaussian naïve bayes learning algorithms were used to develop two sets of classification models. Hence, the classification models with full features (32) and models with the 5 fittest features. The two sets of classification models were evaluated, and the results of the evaluation were compared. The result of the comparison shows that the models with the selected fittest features outperformed their counterparts with full features in terms of accuracy, sensitivity, and sensitivity. Therefore, a fuzzy neural network based expert system was developed with the five selected fittest features and the system achieved 99.33% accuracy, 99.41% sensitivity, and 99.24% specificity. Moreover, based on the comparison of the system developed in this work against the previous works that used fuzzy neural network or other applied artificial intelligence techniques on the same dataset for diagnosis of breast cancer using the same dataset, the system stands to be the best in terms of accuracy, sensitivity, and specificity, respectively. The z test was also conducted, and the test result shows that there is significant accuracy achieved by the system for early diagnosis of breast cancer.
Article
Full-text available
Methods: Our analysis and machine learning algorithm is based on most cited two clinical datasets from the literature: one from San Raffaele Hospital Milan Italia and the other from Hospital Israelita Albert Einstein São Paulo Brasilia. The datasets were processed to select the best features that most influence the target, and it turned out that almost all of them are blood parameters. EDA (Exploratory Data Analysis) methods were applied to the datasets, and a comparative study of supervised machine learning models was done, after which the support vector machine (SVM) was selected as the one with the best performance. Results: SVM being the best performant is used as our proposed supervised machine learning algorithm. An accuracy of 99.29%, sensitivity of 92.79%, and specificity of 100% were obtained with the dataset from Kaggle (https://www.kaggle.com/einsteindata4u/covid19) after applying optimization to SVM. The same procedure and work were performed with the dataset taken from San Raffaele Hospital (https://zenodo.org/record/3886927#.YIluB5AzbMV). Once more, the SVM presented the best performance among other machine learning algorithms, and 92.86%, 93.55%, and 90.91% for accuracy, sensitivity, and specificity, respectively, were obtained. Conclusion: The obtained results, when compared with others from the literature based on these same datasets, are superior, leading us to conclude that our proposed solution is reliable for the COVID-19 diagnosis.
Article
Full-text available
Vehicular ad hoc networks (VANETs) are a subsystem of the proposed intelligent transportation system (ITS) that enables vehicles to communicate over the wireless communication infrastructure. VANETsare used in multiple applications, such as improving traffic safety and collision prevention. The use of VANETs makes the network vulnerable to various types of attacks, such as denial of service (DoS) and distributed denial of service (DDoS). Many researchers are now interested in adding a high level of security to VANETs. Machine learning (ML) methods were used for constructing a high level of security capabilities based on intrusion detection systems (IDSs). Furthermore, the vast majority of existing research is based on NSL-KDD or KDD-CUP99 datasets. Recent attacks are not present in these datasets. As a result, we employed a realistic dataset called ToN-IoT that derived from a large-scale, heterogeneous IoT network. This work tested various ML methods in both binary and multi-class classification problems. We used the Chi-square (Chi2) technique was used for feature selection and the Synthetic minority oversampling technique (SMOTE) for class balancing. According to the results, the XGBoost method outperformed other ML methods.
Article
Seeing as Smart Healthcare Systems provide cloud services for storing patient health records, data security and privacy are critical to the company's success, and patients do not want their identities to be revealed. The authentication procedure requires disclosing users' personal data, such as a username and password, on the authentication server in order to protect their identities. The patient's privacy may be invaded if the patient can be observed or linked to by the patient's unfortunate foes. As a result, we propose in this paper a system that gives patients anonymity, protection, and privacy of sensitive healthcare data from the Authorization Service and enemies. A camel-based rotating panel signature program was used in our proposed work to provide anonymity to health records while also adding extra security to the network layer. The effectiveness of the programs was assessed using theoretical analysis, which revealed that the program has a range of security characteristics and is resistant to multiple attacks.