2023
DOI: 10.3991/ijim.v17i19.27663
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory

Abdulfatai Shola Hanafi,
Yakub Kayode Saheed,
Micheal Olaolu Arowolo

Abstract: A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices communicating in a distributed fashion across numerous hops. MANETs are an appealing technology for many applications, including rescue operations, environmental monitoring, tactical operations, and so on, because they let people communicate without the usage of permanent infrastructure. This flexibility, however, creates additional security vulnerabilities. Because of its benefits and expanding demand, MANETs have attracted a lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 42 publications
0
2
0
Order By: Relevance
“…As seen in Figures 3 and 4 [14], the results of the measures of successful data transfer within a specific interval of time are indicated by bandwidth and the rate at which packets are dropped. Time complexity is illustrated in see Figure 8, showing the duration required, how long it takes to execute the suggested approach, and the total number of network activities involved.…”
Section: Implementation and Experimental Resultsmentioning
confidence: 99%
“…As seen in Figures 3 and 4 [14], the results of the measures of successful data transfer within a specific interval of time are indicated by bandwidth and the rate at which packets are dropped. Time complexity is illustrated in see Figure 8, showing the duration required, how long it takes to execute the suggested approach, and the total number of network activities involved.…”
Section: Implementation and Experimental Resultsmentioning
confidence: 99%
“…Mobile technology is fascinating for various applications, such as rescue operations, environmental monitoring, tactical operations, and more, as it enables human communication without relying on permanent infrastructure. However, this flexibility creates additional security vulnerabilities [23]. The POGIL metaphorming model is based on constructivist theory.…”
Section: Literature Reviewmentioning
confidence: 99%